rogers security - kirsten vogelsang
TRANSCRIPT
1
Security
from Rogers
Presentation
Kirsten Vogelsang
Commercial Account Executive
Office: 613-247-4572
All brand names and logos are trademarks of their respective owners. ©2016 Rogers Communications.
2
36% of Canadian
businesses were the
victims of cyberattacks
in the last year.*
is what it can take to
detect a breach.*
1,425% is the average ROI
for a cybercrime.**
$2.1 trillion will be the annual cost
of breaches by 2019.
What is the impact of cybercrime today?
Security from Rogers
3 months
*Exposing the Cyber Security Cracks: Canada (2014), Ponemon Institute,; Trustwave Global Security Report, 2015
**The Future of Cybercrime and Security, Juniper Research, December 5, 2015
Achieving security is
easier said than done
of businesses don’t have 24/7 security.
Lack the skills for effective security.
lack access to the necessary tools.
find security too expensive.
27%
61%
37%
33%
Source: IDC Canada’s ITAP n3 survey, 2015
Security from Rogers 3
4 Security from Rogers
The trouble with traditional security
Traditional options are burdensome to
deploy and manage because:
• Multiple parties complicate
implementation, support and billing
• Multiple licensing arrangements
increase costs
That’s why many businesses turn to
managed security solutions as an alternative.
5
As your network carrier, Rogers:
• Knows your network best
• Continues to be a single point of contact
• Keeps your billing simple
Protect data, manage risk and achieve
compliance while driving efficiency and
innovation.
Why choose security from Rogers?
Security from Rogers
Global
reach
Delivered
as a service
6
Security services are purchased for a
monthly fee, preparing you to defend against
new threats and freeing up your IT
professionals to innovate for your core
business.
What “as a service” means, and why it matters
Security from Rogers
“As a service” means “managed”, plus:
• Shifting security spending from
CapEx to OpEx
• No hardware or software to own
• Reinvesting capital in other areas of
your business OpEx > CapEx
7
What “global reach” means, and why it matters
Security from Rogers
“Global reach” means you’ll benefit from 8
SOCs around the world that:
• Are staffed 24/7 with security experts
• Conduct global research on emerging
threats
• Share findings with each other to
enhance threat intelligence
Our SOCs are in:
• Kitchener-Waterloo
• Australia
• Chicago, Denver, Minneapolis
• Warsaw
• Singapore
• Manila
Mitigate global threats before they get to
Canada with access to a threat intelligence
network no other Canadian network carrier
can provide.
8
Vulnerability
Management
Threat
Management
Compliance
Management
Proactively search for and
strengthen weaknesses
Stop security threats
in their tracks
Easily meet
compliance mandates
• Blended scanning and
testing
• Vulnerability Testing
• Security Information and
Event Management (SIEM)
• Firewall Management
• Unified Threat
Management (UTM)
• Intrusion
Detection/Prevention
System (IDS/IPS)
• DDoS protection
• UTM
• Compliance suite
• Endpoint suite
Specific security services we offer
Security from Rogers
9
Vulnerability Management services
Security from Rogers
Blended scanning
and testing
Vulnerability
Scanning
Have your network scanned and tested by your
own staff or by our experts
Prioritize vulnerabilities, learn to fix them and
verify remediation over time.
• Conduct self-serve or managed scans
• Run the right tests at the right time
• “Ethical hacks” determine your
overall resilience
• Easily generate reports on security progress
• Run regular or ad hoc scans according to
your schedule
• Learn about emerging threats with tests
and plug-ins
10
Security Information
and Event
Management (SIEM)
Unified Threat
Management
(UTM)
Firewall
Management
Intrusion
Detection/Prevention
System (IDS/IPS)
Rogers DDoS
Protection
• Offload
tedious log
monitoring
and complex
threat
correlation
• Gain visibility
into your
security
network via
our customer
portal.
• Receive
comprehensive
protection with
one appliance
• Trustwave®
devices are
offered
• Offload
provisioning,
deployment,
upgrading and
patching of
Trustwave or
third-party
firewalls
• Offload
security policy
updates
• Monitors and
blocks data
from malicious
sources
• Maintain
business
continuity
• Trustwave
devices are
offered
• Detects
volumetric
DDoS
attacks in just
minutes
• Helps ensure
uptime
• Fully
managed
and cloud-
based
Threat Management services
Security from Rogers
11 Confidential | Presentation Title
PLACEHOLDER SLIDE FOR DDOS PROTECTION SUMMARY SLIDES
12
Compliance Plus
Security from Rogers
UTM Compliance suite Endpoint suite
• Comprehensive
protection with one
appliance.
• Includes Quarterly scanning,
data loss prevention, self-
assessments, PCI training and
policy templates.
• Includes managed and
automated policy,
compliance and security
controls, file monitoring,
device logging and online
endpoint monitoring.
13
Secure,
cloud-based
customer portal
Trustwave
SpiderLabs®
• View (or manage) events,
alerts, trends, reports and
technologies
• Includes easy-to-
understand dashboards
for monitoring, scanning,
testing and compliance
• Interact with the experts
at the Kitchener-Waterloo
SOC
• Trustwave’s “Spiders”
conduct “ethical hacks” –
or penetration tests –
using cybercriminal
methods
• Assesses your resilience
to a real attack
• Trustwave is a world
leader in the managed
security market
Supporting features and staff
Security from Rogers
Security from Rogers
Protect you corporate
and customer data
Free up IT for
innovation
Meet your regulatory
requirements