overview of ais e-managedsecurity

26
Introducing AIS e- ManagedSecurity Powered by 1

Upload: aisdc

Post on 24-Jun-2015

1.118 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Overview of AIS e-ManagedSecurity

1

Introducing AIS e-ManagedSecurity

Powered by

Page 2: Overview of AIS e-ManagedSecurity

2

AIS e-ManagedSecurity Defined

• AIS e-ManagedSecurity is a comprehensive enterprise-class, security solution consisting of premises and cloud-based security services, for protecting an organization across all potential attack vectors and fulfilling compliance requirements.

Page 3: Overview of AIS e-ManagedSecurity

3

Why Choose AIS e-ManagedSecurity?

• Companies can easily and cost-effectively implement a comprehensive security strategy that requires minimal deployment resources.

>>No upfront capital costs<<• Increases the level and quality of regulatory

compliance, along with improving a company's audit preparedness.

Page 4: Overview of AIS e-ManagedSecurity

4

Why Choose AIS e-ManagedSecurity?

Single Pane of Glass• Provides visibility to all security

event data, alerts, logs, scans, and threat intelligence.

• There are over 100 pre-built dashboards including compliance specific reports.

• Fully customizable to best meet the demands of new regulations and needs specific to their business.

Clients have access to tools for real-time analysis and one-click alert drill downs.

Page 5: Overview of AIS e-ManagedSecurity

5

Why Choose AIS e-ManagedSecurity?

• It is based on highly scalable hybrid security architecture pioneered by

– Incorporates industry accredited standards – Includes flexible service levels– Addresses PCI, HIPAA, SOX, GLBA,

NERC compliance requirements.

Page 6: Overview of AIS e-ManagedSecurity

6

Why Choose AIS e-ManagedSecurity?

The AIS Emphasis on Total Solution

• AIS ProServices Experts will incorporate Managed Security as part of a comprehensive colocation, managed services and connectivity solution tailored to meet business and operational objectives.

Page 7: Overview of AIS e-ManagedSecurity

7

Drilling Down – The Offering

Page 8: Overview of AIS e-ManagedSecurity

8

AIS e-Managed Security Services

Page 9: Overview of AIS e-ManagedSecurity

9

AIS e-Managed Security Services

• Firewall Management for colocation, enterprise and branch office includes 24x7 monitoring, patching, technical support, firewall rule creation, full troubleshooting, logging, and reporting.

Plus

Perimeter ManagedFirewall

Page 10: Overview of AIS e-ManagedSecurity

10

AIS e-Managed Security Services

• Network Intrusion Prevention Service (IPS) - combines monitoring, incident detection/response, logging, reporting and full management including signature management and tuning. – Offers multi-segment protection for complex network topologies.

• Vulnerability Scans proactively discovers and evaluates potential and confirmed security threats.

– Can be used to audit internal and external servers, as well as Web applications.

– Vulnerability and remediation management workflow are part of this solution.

Plus

NetworkNetwork IDSNetwork IPS Vulnerability Scanning

Page 11: Overview of AIS e-ManagedSecurity

11

AIS e-Managed Security Services

• Log Management provides real-time collection, aggregation, and normalization of log data from network devices, servers, and security sensors for pre-forensic archival and compliance reporting.

– Handles all logging devices, including firewalls, servers, and network devices.

Plus Lo

g M

anag

emen

t

Rep

ort

ing

Dat

a

Plus

Page 12: Overview of AIS e-ManagedSecurity

12

AIS e-Managed Security Services

Compliance-related include:

• Web Application Firewall (WAF) includes tuning, management monitoring, 24x7 support, patching and upgrade recommendations, reporting, and policy enforcement.

– Fulfills compliance requirements

Plus

HostHost IDSHost IPS

File Integrity Manager

Web Application Firewall

Page 13: Overview of AIS e-ManagedSecurity

13

AIS e-Managed Security Services

Compliance-related include:

• File Integrity Management (FIM) acts as a secondary layer of protection beyond anti-virus messaging and alerting monitoring system.

– It ensures that key systems files are not replaced or tampered with without notification.

– This service is used to help enforce security policies and compliance standards.

Plus

HostHost IDSHost IPS

File Integrity Manager

Web Application Firewall

Page 14: Overview of AIS e-ManagedSecurity

14

AIS e-Managed Security Services

• Firewall Policy and Compliance Analysis (PCA) provides security policy configuration analysis.

– Comprehensive, scalable, non-intrusive, easy-to-deploy and use

– Supports the major firewall platforms in the enterprise market.

Compliance Firewall Policy Mgmt Compliance Analysis

Page 15: Overview of AIS e-ManagedSecurity

15

AIS e-Managed Security - Notables

• Menu-based services approach – Tailored to company size and compliance requirements

• Vendor Neutral– Can manage any existing client hardware

• Licenses & hardware bundled into subscription

Page 16: Overview of AIS e-ManagedSecurity

16

Flexible Service Plan Levels

Self-Service

Co-Managed

Fully Managed

Basic Support SharedResponsibility

FullSupport

Companies can decide what levels of security services they need

Page 17: Overview of AIS e-ManagedSecurity

17

Other Notables

Page 18: Overview of AIS e-ManagedSecurity

Our Partner - Notable

– Founded - 2001, HQ in San Diego CA– Recent Best of SaaS Winner– Clients - North America, Canada, Mexico, Europe, Asia– Industry Expertise - Financial, Healthcare, Biotech, Retail/ e-commerce,

Hospitality, & Others

18

Page 19: Overview of AIS e-ManagedSecurity

19

Some Questions for Consideration

Page 20: Overview of AIS e-ManagedSecurity

20

Questions to Ponder

• Regulatory: – Do you have regulatory compliance standards (PCI, SOX,

GLBA/FFIEC, HIPAA) that you’re required to meet?

• Monitoring: – Do you have concerns about monitoring all of the

compliance controls that you have in place?– Is there a possibility that your company could be non-

compliant without realizing it (i.e. systems put in place may not be functioning)?

Page 21: Overview of AIS e-ManagedSecurity

21

Questions to Ponder

• Security Alerts: – Do you have 24x7 Coverage for receiving and responding

to security alerts?

• Up-to-date: – Are your current security tools, products, and solutions

being tuned, maintained, patched, etc.? – Are they current with the latest security signatures, threat

updates, etc.?

Page 22: Overview of AIS e-ManagedSecurity

22

Questions to Ponder

• Attacks & How They are Handled: – What is your process for triaging security alerts, events,

and potential attacks? Does this happen in real time? How long until an attack is identified and the response occurs?

– Do you think that there are attacks on your IT infrastructure that go unrecognized or unnoticed?

Page 23: Overview of AIS e-ManagedSecurity

23

Questions to Ponder

• Protection & the ROI Tradeoff:– Do you think that the costs associated with maintaining

existing security products and solutions and the staff product expertise required to maintain and operate them exceed the return gained in terms of protection received or risk that is mitigated?

Page 24: Overview of AIS e-ManagedSecurity

24

AIS Can Help…

• We can address your security concerns and…

• Look at your overall IT infrastructure and…

• Help devise a comprehensive IT solution that'll scale along with your business.

Page 25: Overview of AIS e-ManagedSecurity

25

About American Internet Services (AIS)

www.americanis.net866.971.2656

Page 26: Overview of AIS e-ManagedSecurity

26

About American Internet Services (AIS)

• We are an enterprise-class data center, cloud and connectivity services company, with premium data center footprints in Los Angeles, San Diego and Phoenix.– We provide colocation, managed, and network

services.– 24x7: Resources are always available when you

need them.– We are privately held, backed by Seaport Capital,

Viridian Investments, and DuPont Capital Management.