Security operations services

24
Security Management Services

description

 

Transcript of Security operations services

Page 1: Security operations services

Security Management Services

Page 2: Security operations services

Chapter 1 Security Management Challenges & Solutions

Chapter 2 Definition of the services

Chapter 3 Phases of Implementation

Chapter 4 Value added for the customer

Chapter 5 Customer testimonial

Chapter 6 Why S&T services?

Security Management Services

Overview

Page 3: Security operations services

Security Management Challenges & Solutions

Chapter 1

Page 4: Security operations services

C H A L L E N G E S S O L U T I O N24/7 reliable and professional pro-active services for business critical environments

Highly trained experts with extensive experience in the design, implementation, and administration of security solutions

Remote or on site delivery of outsourcing services

SLA based availability and performance

Security Management Services

Challenges & Solutions

• Every company needs reliable and secure internet access

• Staff skills need to be continually updated leading to high education costs.

• Security logs must be continuously and pro-actively monitored.

• Security incidents demand pre-planned and coordinated responses.

• Proposed security policy changes must be analyzed and carried out without delay.

• Security is not customer’s core business

Page 5: Security operations services

Definition of the servicesChapter 2

Page 6: Security operations services

Security Management Services

Service definition

Equipment, facilities and license owned by Customer

Equipment, facilities and licensing provided by S&T

FirewallsIntrusion Prevention (Detection) systems

Email security Web security with application control

24x7 system and service administration, business as usual

monitoring, reporting, analyses and alerting documentation and procedures

Page 7: Security operations services

9“IT”

Business Process

Operating system layer (Platform)

Network

Facility

Workplace

Applications

Server, storage, virtualization

Middleware (DB, FS, AD,...)

Tran

sitio

n &

Impl

emen

tatio

nSe

rvic

es

Des

ign

& D

evel

opm

ent

Serv

ices

IT S

ervi

ces

Man

agem

ent

Secu

rity

Supp

ort &

Mai

nten

ance

Se

rvic

es

Mon

itorin

g S

ervi

ces

Adm

inis

trati

on S

ervi

ces

Man

aged

Se

rvic

es

Cons

ulta

ncy

and

Inte

grati

on

Business Strategy

IT Strategy

Security Management Services

Service definition

Page 8: Security operations services

Security Management Services

Managed services delivery approach

10

Page 9: Security operations services

Phases of Implementation

Chapter 3

Page 10: Security operations services

Phase 1Phase 2

(optional)Phase 3 Phase 4

Assesment of existing Security infrastructure

Security DesignInitial

Installation

Operational Management

Documentation (schemes, concepts)

Project scopeConfiguration

IntegrationDocumentation

Administration,Configuration,

SLA, …(HW/SW main.)

Defi

nitio

nRe

sult

Service Transition

Service managed and monitored by

S&T

Security Management Services

Phases of implementation

Page 11: Security operations services

Security Management Services

Operational Management

Services Included Execution

Real-time monitoring and notification (integration with Infrastructure Availability service or Infrastructure Monitoring service)

Mandatory Remote

Incident Management(receive and resolve problems, case tracking system)

Yes Remote

Problem Management(diagnose the root cause of incidents, determine solutions/workarounds for such problems)

Yes Remote/On-site

Service requests (business as usual)(existent configuration support, smaller configuration tasks, daily/monthly administration tasks, …)

Yes Remote/On-site

Page 12: Security operations services

Security Management Services

Operational Management (cont.)

Services Included Execution

Documentation Management (up-to-date documentation and diagrams)

Yes Remote

Service Level Management(monthly reports, customer portal, access to monitoring tools)

Yes Remote

Project related service improvement(major configuration changes, moving/adding devices/locations)

Optional Remote/On-site

System engineers with appropriate certification Yes /

Page 13: Security operations services

Security Management Services

HW/SW Maintanance (Add-on service)

Services Included Execution

Maintenance contract with equipment vendors (back-to-back) for device OS

Mandatory /

Upgrading and patching device OS Yes Remote/On-site

Hardware spare parts Yes Remote/Local

Hardware replacement Yes On-Site

Page 14: Security operations services

Cisco ASA, PIX Check Point IBM Proventia MX

Firewalls

Security Management Services

Technology used and supported

IPS Cisco Check Point IBM Proventia GX

Email and Web Security ClearSwift SafeNet IronportWebsenseBlueCoat

Page 15: Security operations services

Value added for the customerChapter 4

Page 16: Security operations services

Security Management Services

Customer benefits

Financial aspectPredictable cost;

Cost efficiency; No need to train internal

IT staff for new technologies

Business aspectsIT focuses on primary business and not on security; Guaranteed service

level and quality; Higher level security and compliance; Single point of contact in local language

Technical aspects :

24/7 availability and proactive administration ; Experienced and certified S&T personnel; Constant access to IT expertise. No need to be concerned with

future upgrades and strategy

Page 17: Security operations services

Customer TestimonialChapter 5

Page 18: Security operations services

Security Management Services

Description of the Customer

The Mercator Group is one of the largest and most successful commercial chains in South-eastern Europe; it is the leading commercial chain in Slovenia and is now operating in seven markets of the region: Serbia, Croatia, Bosnia and Herzegovina, Monte Negro, Bulgaria and Albania. These are all swiftly growing markets, and with shopping malls in capitals and regional centers Mercator strives to become the first or second largest fast-moving consumer goods retailer in each market. Mercator is also an important retailer in the region in specialized technical program, clothing and sportswear.

Page 19: Security operations services

Security Management Services

Customer Testimonial

» In Mercator we rely on experts from S&T Slovenia for the administration and supervision of Firewall and networking equipment on the network perimeter in the six countries within which our company operates. S&T takes care of business as usual tasks such as management and changes to configurations as well as actively monitoring the complete operation of the system ensuring minimal downtime and the quickest possible return to operation in case of unexpected incidents causing downtime.We are very satisfied to have found in S&T Slovenia a reliable and skilled IT partner, able to provide deep technical knowledge and a complete service package «

Page 20: Security operations services

Why S&T Services?Chapter 6

Page 21: Security operations services

Quick facts

• € 411 M annual revenue• No.1 consulting company in CEE region• One of the largest IT service provider• Operating in 19 countries with

more than 2600 professionals• Certified experts in every country

(IBM,HP,CISCO,Check Point, MS,...)

Business mix

30%

40%

30%ConsultingIntegrationOutsourcing

CHAPTER 5

Security Management Services

Why S&T – overview of the company

Page 22: Security operations services

Quick facts

• Vendor independent • Multi-vendor solutions• Trained and educated staff • Advanced partnership status with different vendors

Strategic partners

CHAPTER 5

Security Management Services

Why S&T – security solutions

• Cisco• Check Point• IBM (ISS)• Clearswift

• SafeNet• Websense• BlueCoat

Page 23: Security operations services

• Efficient IT operations services used by numerous companies region-wide • Information security (ISO 27001) certified processes• Experience in the most complex IT environments • Competent and certified staff • Consulting and integration expertise

CHAPTER 5

Security Management Services

S&T experience

Page 24: Security operations services

Security Management Services

Thank you

Questions and debate ...