Managed Security Services


Manoharparakh1001

Uploaded on Jul 15, 2020

Category Technology

For any organization managed security services play an important role in enhancing the security posture, alerting against top vulnerabilities along with rapid and anywhere deployment.

Category Technology

Comments

                     

Managed Security Services

Managed Security Services An ESDS Offering Company Overview About ESDS • Born with a global mind-set, ESDS began its operations from the Tier 2 city of Nashik (India) in 2005 and presently has its footprint in 19 nations across APAC, Europe, Middle East, the Americas and Africa. ESDS acts as a catalyst for digital transformation in the modern outcome-based economy by enabling organizations to embrace advanced technologies. • At ESDS, we believe in creating lifetime relationships and fostering a culture of co-existence by uniting minds that are passionate about delivering innovative solutions and exuberant customer experience. More than 750 organizations, backed by a committed workforce at ESDS, have successfully achieved their business objectives. Common Cyber Security Threats Globally Cyber Security in Indian Scenario- A Snapshot 78% Companies with no Cyber incident response plan 74% BFSI Sector is a Top Target 63% attacks amounted to financial loss SOC Solutions SOC Solutions Eagle Eye Services SOC Security Insight SOLUTIIONS Services Total Secure Services Growing Importance of SOC • Determines the complete security (Cyber, digital & information security) team functionality of any business organization=on • Responsible for assessment and implementation of the security posture for an organization • Deploying and managing layers of security with the aim of protecting valuable data of an organization • SOC-as-a-Service helps the companies to distinguish real threats and act on these problems with higher focus and urgency Growing Importance of SOC (Cont.…) • Involves components like- infrastructure, process, people, and other devices for converting and reactive monitoring, assessment, testing along remediation for all threats- potential as well as actual • Includes constant knowledge, skill and system for pulling out potential threats from large data volumes collected & analysed • Companies working on huge networks collect huge critical data logs. All these require advanced SOC-as-a-Service SOC Services (Eagle Eye Services) • Data aggregation • Correlation and security monitoring • Analytics Data • Alerting Aggregation • Dashboards Correlation • Compliance Reporting/ & Security • Log Retention (1 Month) Compliances Monitoring • Incident response • Defining different reports and sending monthly reports of all SOC Eagle Eye security incidents. Services • Monitoring different events on 24*7 basis. Threat Alerting & • Threat Intelligence Intelligence / Incident Machine • User Behaviour & Event Analytics ResponseLearning • Machine Learning User • Real time Threat Hunting & detection Behaviour & Event • Intimating customers about security risk and incidents and Analytics suggesting require actions. • Studying and Reporting anomalies SOC Services (Security Insight Services) Security Posture Analysis • Understanding roles and responsibilities Security • System and Network architecture study Assessment • Planning deployment techniques Security Incident & Threat Analysis Reports & Application/ Recommend DB Testing- • Integration with monitoring Services ation Assessment • Devices traffic Monitoring • SOC Security Network flow analyzer Insight Services • Traffic analysis and reporting • Network Flow Assessment SIEM Email & Effectiveness Wireless • Database Activity Assessment Modeling Assessment • Application Performance Assessment • Performing Vulnerability scans Gap Analysis • Review Application system @ client IT environment • Monitoring, logging, Reporting SOC Services (Total Secure Services) • All Security Eagle Eye & Insight services deliverables Security Incident • Proactive Remediation of Monitoring Security incidents with Proactive Overall Remediation/ Customer in Loop Security Onsite Assessments Availability • Onsite availability of ESDS SOC Security expert at critical Total Secure Sevices security issues on resolution UBEA /Threat Database/ advisory Intelligence/ Application ML Monitoring • Periodic client visit of ESDS Addon Services/ Security expert for verifying Email/ DLP/Wireless security environment Security eNlight WAF Overview • A software solution designed for protecting web applications from threats and attacks • Enterprises are using several public facing applications • Detects and prevents OWASP TOP-10 Threats eNlight WAF Modules WAF Policy Managemen t PKI WAF Ruleset Managemen Managemen t t Virtual Report, Log Managemen Patching t Applications Managemen t eNlight WAF Features & Lifecycle 1. OWASP Top-10 Defender 2. In-built Load Balancer 3. Source IP Reputation Analysis 4. Log Analysis (SIEM) 5. Learning Mode 6. Virtual Patching 7. Source IP Reputation Analysis 8. Customizable WAF Ruleset eNlight WebVPN Features of eNlight WebVPN Supports Windows, MAC, Linux and mobile OS Supports for HTML5 applications, Websocket, RDP, FTP protocols, CGI applications Integrate with multiple identity providers simultaneously(AD, LDAP, Radius etc.) Multifactor authentication with SMS and Email OTP Time based OTP with Google and Microsoft Authenticator WAF protects from OWASP Top 10 Vulnerabilities Granular Application Access Control Benefits of eNlight WebVPN Anywhere Anywhere Authorization & Interoperability Accessibility Deployment Protection Integrate with any Across all desktop Deployment on identity providers to OS, Public, on-Premise or authenticate users Browsers & Mobile hybrid cloud for ML capability for Devices private secured anomaly detection access eNlight Web VPN v/s Legacy VPN eNlight Web VPN Legacy VPN • Clientless WebVPN • Client or Agent Based • More secure- giving access to only applications • Less secure- gives access to complete network • Cost-effective solution • High Cost • Granular access control • Fixed access control • Don’t need to reconnect when Internet • Need to reconnect in case of Internet network network changes changes • Easy to deploy and use • Complex deployment and usage • Scalable and HA • Less scalable and HA • Includes WAF and OWASP Top-10 • WAF and other security features not available Vulnerabilities Concluding Remarks Thus, for any organization managed security services play an important role in enhancing the security posture, alerting against top vulnerabilities along with rapid and anywhere deployment. If you’re interested to leverage any of the mentioned managed security services in your organization, feel free to reach Team ESDS through https://esds.co.in/ [email protected] 1800 209 3006