integrated advice for your cyber security landscape · own cyber defense center as a control center...

2
COMPACT. COMPETENT. CONCRETE. With standardized consulting packages from Deutsche Telekom, you can easily implement customized cyber security solutions. MAgENTA SECURITY According to the Experton Group, Deutsche Telekom is the leading provider of security solutions in Germany (Security Vendor Bench- mark 2016). Our comprehensive expertise is bundled in a powerful cyber security unit. It also forms a protective shield for all of our customers from key accounts to SMEs through to authorities and consumers. Now you can take advantage of the long-time and comprehensive experience of our security experts! EXPERTISE AT YOUR SIDE More than 20 years in cyber security 1,200 security specialists Protection from 210,000 attacks and 700,000 spam emails – per minute New products constantly launched against current threats Own Cyber Defense Center as a control center for the early detection of risks Zero impact as the primary objective to prevent cyber attacks before they happen CONTACT www.t-systems.de/security Or send an email to [email protected] PUBLISHED BY T-Systems International GmbH Hahnstrasse 43d 60528 Frankfurt am Main Germany Last revised 09/2017 | Errors and omissions excepted | Printed on chlorine-free bleached paper | typix INTEgRATED ADVICE FOR YOUR CYBER SECURITY LANDSCAPE Today’s IT security requires a security concept across the entire value chain – from the data center to the network through to the smartphone. But where to begin? How to keep track of everything? Magenta Security serves as a defensive cyber shield to help protect you from threats from the Internet. As easily as Magenta Security works with solutions from a single source, that’s how easy it is to get started thanks to standardized consulting packages. Our compact consulting packages at a fixed price give you individual decision-making tools for implementing your cyber security measures.

Upload: others

Post on 13-Jul-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: INTEgRATED ADVICE FOR YOUR CYBER SECURITY LANDSCAPE · Own Cyber Defense Center as a control center for the early ... Included: Security concept, VoIP readiness of hardware, planned

COMPACT. COMPETENT. CONCRETE.With standardized consulting packages from Deutsche Telekom, you can easily implement customized cyber security solutions.

MAgENTA SECURITY

According to the Experton Group, Deutsche Telekom is the leading provider of security solutions in Germany (Security Vendor Bench-mark 2016). Our comprehensive expertise is bundled in a powerful cyber security unit. It also forms a protective shield for all of our customers from key accounts to SMEs through to authorities and consumers. Now you can take advantage of the long-time and comprehensive experience of our security experts!

EXPERTISE AT YOUR SIDE

�� More than 20 years in cyber security�� 1,200 security specialists�� Protection from 210,000 attacks and 700,000 spam

emails – per minute�� New products constantly launched against current threats�� Own Cyber Defense Center as a control center for the early

detection of risks�� Zero impact as the primary objective to prevent cyber attacks

before they happen

CONTACTwww.t-systems.de/securityOr send an email to [email protected]

PUBLISHED BYT-Systems International GmbHHahnstrasse 43d60528 Frankfurt am MainGermany

Last

revis

ed 0

9/20

17 |

Erro

rs a

nd o

mis

sion

s ex

cept

ed |

Prin

ted

on c

hlor

ine-

free

blea

ched

pap

er |

typi

x

INTEgRATED ADVICE FOR YOUR CYBER SECURITY LANDSCAPE

Today’s IT security requires a security concept across the entire value chain – from the data center to the network through to the smartphone. But where to begin? How to keep track of everything? Magenta Security serves as a defensive cyber shield to help protect you from threats from the Internet. As easily as Magenta Security works with solutions from a single source, that’s how easy it is to get started thanks to standardized consulting packages.

Our compact consulting packages at a fixed price give you individual decision-making tools for implementing your cyber security measures.

Page 2: INTEgRATED ADVICE FOR YOUR CYBER SECURITY LANDSCAPE · Own Cyber Defense Center as a control center for the early ... Included: Security concept, VoIP readiness of hardware, planned

CERT & INCIDENT RESPONSE MgMT. Cyber attacks cannot be avoided, but losses from them can. The keys are detection, classification and rapid resolution. Are you technically and organizationally prepared? Is there a Computer Emergency Response Team (CERT)? Use incident management to ensure your defense.

�� CERT rollout; analysis of skills for handling security-critical incidents

�� Define relevant CERT/IRM functions; compare current/target situation

�� Presentation of results, recommendation of next technical/organizational steps

You have extensive CERT and IRM know-how and know which pro-cesses and services to use to defend yourself from cyber attacks.

MOBILE DEVICE SECURITY Mobile devices increasingly use sensitive company data. How can you securely integrate them into your infrastructure through authentication, encryption and anti-virus protection and fend off attacks? Together we will create a plan for your mobile security.

�� Introduction to mobile device security, assessment of individual situation

�� Risk assessment including presentation of situation without device protection

�� Presentation with proposal for customized approach for mobile security

Your situation and current risks are transparent. You can ensure that your mobile devices are secure for the future.

APT STRATEgY & ROADMAP Advanced persistent threats to IT systems are increasingly common. They often do their damage for days before being noticed. Are you prepared for current and future attacks? Can you react quickly? Prepare yourself with a customized strategy.

�� Analysis of operational, procedural APT capabilities and compare with target vision

�� Strategy and roadmap with activities to achieve effective cyber security

�� Final report, presentation of investigation results with recommended actions

You know the current operational, procedural and technical situation and know which strategy protects you from APT attacks.

SAFE USE OF CLOUDS Cloud computing offers great opportunities to quickly and flexibly realize new business requirements. But what does the move into the cloud mean in terms of security? How does security from the cloud benefit you? Learn how to safely plan your transition to the cloud.

�� Scoping & interview: Defining individual goals and systems to be transformed

�� IT security analyses: Requirements, cloud maturity check, cloud services

�� Presentation with recommended action and prioritized steps to desired cloud maturity

You are familiar with cloud security and services. You know your risks and use recommendations for your path into the cloud.

PROTECTION OF VOICE SERVICES The all-IP migration with a complete transition to voice over IP (VoIP) demands strong security for voice data in LAN, WAN and Internet. Is your security concept ready for the VoIP migration? What is the course for PBX? We will find the answers to these questions before your migration.

�� Included: Security concept, VoIP readiness of hardware, planned cloud solutions

�� Individual security assessment: Network topology, hardware, VPN connections

�� Presentation of results with customized recommendations for a secure all-IP migration

With the knowledge of how to integrate all-IP security in your overall concept, you can be less anxious about your migration.

€5,300Workshop: 1 day

Presentation: ½ day

Internal: 2 ½ days

€4,000Workshop: 1 day

Presentation: ½ day

Internal: 1 ½ days

€4,000Workshop: 1 day

Presentation: ½ day

Internal: 1 ½ days

€12,5002 Workshops: 3 days

Presentation: 1 day

Internal: 6 days

TWELVE PACKAgES OF EXPERTISE: FIXED PRICE, SIMPLE, COMPACT AND INDIVIDUAL

Discover how to get a handle on individual cyber security. With standardized consulting packages from Deutsche Telekom‘s Security Consulting, you can evaluate your initial situation in terms of most frequent issues, need for action and specific measures. In addition to these standard packages, we would be happy to design a completely customized, specific concept for your company.

ORIENTATION WORKSHOP Legacy IT environments are technically complex and demanding. Is your existing IT security capable of identifying current attack patterns from targeted attackers? In this workshop, we’ll perform a joint security inventory.

�� Analysis: IT infrastructure, network, clients, applications, user and authentication

�� Design: Target vision for security operations, incl. attack defense measures

�� Presentation of results with risk assessment, technology recommendations and documentation

You have a comprehensive picture of your security level, know your risks and can determine what level you can reach and how.

PROTECTION FROM DDOS ATTACKS Limited accessibility harms the revenue and image of online services and websites. What are you doing to protect against volume attacks? Do your measures have vulnerabilities? This workshop focuses on protecting your company effectively.

�� Analysis of DDoS threat potential in network, application and web services

�� Assessment of the effectiveness of existing defense measures

�� Presentation of results with technical and organizational recommendations for action

You know how you can protect yourself from all of the familiar DDoS scenarios with DDoS defense for backbone, on-premise and cloud web.

PENETRATION TESTS Attackers set their sights on the hardware, systems and data of every organization. Is it possible for them to take control of networks and sensitive applications, misuse internal services or exploit old systems at your company? Penetration tests identify vulnerabilities.

�� Simulated cyber attacks offer a controlled way to identify security gaps

�� Types of tests: Network and application tests, Advanced Persistent Threat (APT) pentests

�� Report with identified security gaps, presentation incl. recommended actions

You know if and to what extent you are at risk and what measures you can use to quickly minimize your risk of damage.

ISMS ANALYSIS An information security management system (ISMS) should be firmly anchored in every corporate strategy as a homogeneous element across global units. Does your security organization meet international ISMS standards? The ISMS analysis highlights need for action.

�� Analysis of existing and practiced ISMS with interviews and current documents

�� Assessment of current security level by means of ISMS maturity model

�� Presentation of results, recommended actions to improve current status

You gain comprehensive transparency about your ISMS according to international standards and can implement optimization potential.

EMPLOYEE AWARENESS A lack of security awareness and responsibility among employees presents security risks. Are the fundamental concepts of information security known at your company? How can your employees contribute to it? In this work-shop, we will jointly define measures for improving security awareness.

�� Customized for up to 12 employee representatives in the IT security field

�� Overview: Concepts, functions, processes, methods, instruments for IT security

�� Employee certification, presentation of results, security awareness program (optional)

Employees with an awareness of IT security can effectively avoid losses resulting from human error or misconduct.

NETWORK SECURITY Isolated corporate networks are a thing of the past. WLAN, 4G / 5G and the cloud are gaining ground. How can you structure secure network transitions? When are public or private networks suitable? Take advantage of the opportunity to optimally design your long-term, secured network.

�� Network analysis: Topology, branch offices, partners, mobile users, cloud services, security

�� Assessment of current and planned scenarios with individual focus

�� Presentation of recommended actions for improving network security

You know how your network needs to be technically designed so that you can take advantage of new, digital opportunities without risk.

NEXT gENERATION FIREWALL More and more applications are shared via the Internet. Secured access is often not up to par. What about your firewalls? How do you protect yourself from new threats at reasonable costs? In this workshop we’ll jointly define a target for your optimal Internet access.

�� Individual analysis: Network and security environment or planned Internet access

�� Determination of maturity level for the migration to a next generation firewall

�� Presentation of the individual NG firewall scenario and necessary measures

You can directly implement a powerful NG firewall and use its benefits for security, control, costs and flexibility.

€4,700Workshop: 1 day

Presentation: ½ day

Internal: 2 days

€3,500Workshop: 1 day

Presentation: ½ day

Internal: ½ day

€3,500Workshop: 1 day

Presentation: ½ day

Internal: 1 day

€6,000Workshop: 2 days

Presentation: ½ day

Internal: 2 days

€4,600Workshop: 1 day

Presentation: ½ day

Internal: 2 days

€2,900Workshop: 1 day

Presentation: ½ day

Internal: ½ day

(PoC optional)

€2,050Workshop: 1 day

Internal: ½ day

The internal activities go toward individual workshop preparation, comprehensive analyses and the development of recommendations for action.

€9,000 APT

€6,500 Network & App

Pentest on premises: 2 days

Presentation: ½ day

Telco & internal: 2 ½ days