Managed Security Monitoring IT BELT #RSAemeaSummit Managed Security Monitoring Who is IT Belt Ø IT Belt is Saudi Based Company specializing in Informa9on Security and Security Monitoring Service Ø IT Belt is part of group of companies Ø We are working with different sectors in the kingdom such as Government, Banking, U9li9es, private, telecoms, etc.. Security is a Top Concern in Organiza=ons Protec9ng highly sensi9ve data (e.g. client data, financial informa9on) from specifically targeted aSacks Preven9ng IT security breaches Data protec9on Ensuring con9nuity of service for business-‐cri9cal systems (e.g. preven9ng DDoS aSacks) Understanding the full range of new technologies that are available and how to use them Managing change in IT systems and infrastructure Ensuring IT systems are used fully to maximize the return on investment (ROI) of IT Making decisions about future IT investments Dealing with cost restraints Planning for and recovering from failure or destruc9on of IT infrastructure 0% 10% 20% 30% The top 4 issues are security-‐related Source: IT Security Risks 2014: A Business Approach to Managing Data Security Threats, Kaspersky Lab 2014 40% What are the Challenges Faced by Organiza=ons in Implemen=ng Security Lake of skilled people Insufficient U=liza=on of Available Threat Informa=on Security Opera=ons and Incident Handling Monitoring Risk & Governance No Development of Customers Staff Rapidly Changing Services and Technology IT Belt Security Monitoring Service IT Belt Managed Security Monitoring offers a 24x7 Security Opera9ons Center to monitor your Organiza9on infrastructure to alert you of suspicious security events before it become incidents. Vulnerability iden9fica9on and remedia9on services allow you to take proac9ve ac9on to reduce risk. Op9on of integra9on and Correla9on with Packet Analysis for full informa9on Protec9on Service By partnering with IT Belt, you can be confident your IT assets and network are being monitored and your Organiza9on protected all the 9me. IT Belt Security Monitoring Service Architecture ITB Analyst ITB Analyst ITB Analyst ITB Analyst ITB Analyst ITB Analyst Incident Handling ITB Analyst Customer Analyst Customer Office Why is the Security Monitoring Service from ITB Different 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. IT Belt implement the Logs and Packets appliances at the customer premises. This data is remains at the customer premises for monitoring, Forensics and analysis. IT Belt connect remotely to the monitoring console at the customer premises for monitoring 24/7. IT Belt Saudi Based security analyst reviews suspicious ac9vity, alerts the customer and collaborate on security event remedia9on if needed. IT Belt will work to proac9vely iden9fy sobware vulnerabili9es and proac9vely apply sobware patches IT Belt can provide Workflow and or Integra9on with your Exis9ng Help Desk CRM system Inclusion of Customer Staff Wherever Possible Training plan and Procedural Experience For Customer Staff Local (On Customer Site) Repor9ng Op9on of On Site Residency Service to Assist with Site based Co-‐Ordina9on IT Belt Managed Security Monitoring Why IT Belt • IT Belt exper=se can help you Manage Threats Before They Become Disrup=ve Events Our cer9fied security professionals serve as an extension of your staff, mi9ga9ng threats to your business and working directly with your team to reduce IT risk through proac9ve security monitoring. • Resolve Your Problems Completely IT Belt Engineers stay engaged un9l the problem is resolved • Localiza=on Ø Local storage ( at Customer Premises) of all logs and events (Self Contained SOC/ DC) Ø Local support, local hours, local people, local culture Managed Security Monitoring Benefits • Minimize risk and protect your business’ mission-‐ cri=cal informa=on Peace of Mind Simplicity • Easy to work with • Local Professional Organiza=on • Lower opera=onal costs and upfront capital expense associated with monitoring and securing your infrastructure Cost efficient Efficient • ShiU the burden of security Monitoring to IT Belt • On-‐demand repor=ng provides easy access and visibility to your cri=cal business assets Service Offering IT Belt provide different monitoring Packages as below: Basic Package Silver Package Gold Package Pla=num Package • Logs Monitoring • Packets Monitoring • Logs Monitoring • Packets Monitoring • Logs Monitoring • Packets monitoring • vulnerability Assessment • Penetra=on Tes=ng (Op=onal) What is the Next Step Analyze the Requirement Support with the needed analysis to know what exactly needed Implementa=on program Heavily Recrui=ng Security Monitoring IT Belt Managed Security Monitoring How we are Managing the SOC Mature and Tested SOC Standard Opera=ng Processes and Procedures Opera=on Management: Ø Shib Opera9ons Ø Customer Management Guide Lines Ø Escala9on Guidelines Ø Ticket handling Ø In-‐bound call handling Ø Outbound call handling Ø Email Handling Ø Portal requests handling Ø Point of Contact Informa9on change Ø Facility Security Policies and Procedures 15 IT Belt Managed Security Monitoring SOC escala=on model 15 15 Q & A
© Copyright 2024