managed services - intelisecure · unlike any other managed security ... at the core of our managed...
TRANSCRIPT
MANAGED SERVICESInteliSecure.com
Unlike any other managed security service provider (MSSP), InteliSecure focuses on protecting your most critical data assets. Those assets that if breached or otherwise exposed would cause significant embarrassment or result in a severe negative impact on your organization’s bottom line. Why? Because perimeter-only security programs continue to prove ineffective against today’s persistent threats.
We help you establish a continuously monitored security intelligence program that protects those critical assets from malicious and accidental breaches, whether from external or internal sources. The result is a highly focused, customized and more effective cybersecurity strategy. This ensures your critical assets stay where they are supposed to be and are only seen by those authorized to have access; even if a breach occurs, or a malicious or negligent insider tries to take away your valuable intellectual property.
At the core of our managed services is the Critical Asset Protection ProgramTM (CAPP). This holistic approach ensures the data assets which directly impact your bottom line are prioritized and protected. Pushing beyond traditional security programs, CAPPs involve key stakeholders, governance and working groups, and cross organization participation to:
• Identify and prioritize critical assets according to their content, community and channel• Develop and optimize cybersecurity policies and workflows• Integrate information security technology investments• Establish reporting and performance metrics
The Critical Asset Protection Program defines the scope of work, optimizes specific policies and workflows, establishes roles and responsibilities, and determines how to deploy and tune security technologies based on your unique needs. We work to ensure your program makes sense and fits with your processes by customizing incident triage, event management, reporting, and key performance indicators (KPIs). Unlike more traditional Managed Security Service Providers (MSSPs), we understand that critical assets change over time and work with you to make sure your program evolves with your business.
InteliSecure Security Operations Center (SOC) personnel are proactively involved during your managed services engagement, recommending policies, rules, and tuning opportunities to maximize protection of your organization’s critical assets. They don’t simply manage your technology, but are active participants that work alongside your internal staff.
A PROVEN METHODOLOGY AND PROCESS - CRITICAL ASSET PROTECTION PROGRAMS
INTELISECURE’S SECURITY OPERATIONS CENTERS
How can we help?Phone: US: +1 720 227 0990 UK: +44 (0) 118 976 8960
Email: [email protected]: www.intelisecure.com
2016_1119
Each client is assigned a dedicated Client Strategy Manager (CSM) who handles all facets of your security program. Your CSM ensures your CAPP continues to meet your needs as your business changes and evolves, serving in the folowing capacities:
• Thought leadership for program improvement and expansion• Management of your service requests• Primary point of contact for escalations• Your overall satisfaction
Your CSM is supported by two specialized teams, the Security Platform Engineering (SPE) and Security Monitoring & Analytics (SMA) teams. The SPE team focuses on ensuring your security program systems have 100% uptime as well as developing, maintaining and making configuration adjustments in scope and policy governance related to your CAPP.
The SMA team is guided by your CAPP to constantly observe, extract and correlate data related to its movement. This ongoing effort is essential in gaining a clear and accurate picture of your security posture in order to provide actionable program recommendations. Knowing the business drivers for your security program allows the team to quickly identify, triage, remediate, and report on any suspicious events.
InteliSecure’s SOCs ensure quality management by performing daily operations in five key areas based on ISO 27000 standards:
Application Management - Management of system components; targeting 100% uptime and availability of your solution. Utilizes Synthetic Transaction Testing for policy trigger validation.
Policy/Rule Development and Tuning - Ongoing technical development of policies/rules and correlations with continuous tuning and optimization.
Event Triage - Monitoring and triage for all generated events.
Incident Management - Process development and documentation assistance by outlining escalation paths and workflow.
Reporting and Analytics - Extensive advanced audit and reporting capabilities, customized based on your unique KPIs.
• Proven, successful processes for implementing and leveraging cybersecurity investments.• Unmatched expertise as an extension of your security team for daily operational tasks.• A clear, more accurate picture of your security posture and how data is moving in and out of the organization.• Analytics and reporting to make more informed and effective decisions about priorities and resource allocation.• Greater confidence among your executives and board in preventing data loss, protecting privacy and safeguarding the organization’s most critical assets.
DAILY MANAGEMENT IN FIVE KEY AREAS
WHAT THIS MEANS FOR YOU
APPLICATIONMANAGEMENT
REPORTING &ANALYTICS
INCIDENTMANAGEMENT
EVENTTRIAGE
SCOPE & POLICYGOVERNANCE
CRITICALASSETS
APPLICATIONMANAGEMENT
REPORTING &ANALYTICS
INCIDENTMANAGEMENT
EVENTTRIAGE
POLICY RULE/DEVELOPMENT
AND TUNING
MANAGED SERVICES