agc networks limited · this vast experience enables agc to design the perfect solution for even...
Post on 27-May-2020
2 Views
Preview:
TRANSCRIPT
Ver 4.1_Jun16
AGC Networks LimitedCyber Security Overview
Agenda
2
05
04
03
02
01
Case Study
AGC CLIENTELE
GLOBAL SECURITY OPERATIONS CENTRE
AGC PORTFOLIO
CYBER SECURITY OVERVIEW
Internet - The Powerhouse
3
Few of the Reported Breaches
4
Source: http://www.informationisbeautiful.net/
Hackers steal $10 million from a
Ukrainian bank through SWIFT
loophole
AGC Networks Corporate Overview
A Leading Global Information & Communications Technology (ICT) Solutions Provider, combining expertise with Best-in-Class technology
30 Years Of Experience Across 9 geographies
Serving Over 3000 Customers Partnering
with 20+ Technology Leaders
Global HQ : Mumbai, India
US HQ : Dallas, Texas
– the Cyber Security division of
AGC Networks • ISO/IEC 9001 and 27001:2005 certified, SOC2 Type 1
Certified
Our vision is to deliver enterprise innovation, creating clear and measurable success for our customers
5
Customer Organization Imperatives
CFOImperatives
CEOImperatives
CIOImperatives
• Revenue Growth• Superior Customer Service• Business Efficiency
• Risk & Compliance• Cost Reduction• Cash Flows
• Investment Protection• Return on Technology
Investment • Rapid Deployment
1. Profitable Growth
2. Customer Experience
3. Security & Compliance
4. Operational Efficiencies
Key Focus Areas
6
7
Global Customer Footprint
Why Choose AGC Networks?
Experienceo AGC Networks has installed over 1 mn Unified
Communications ports, 500K data ports and 100K video end-points worldwide. This vast experience enables AGC to designthe perfect solution for even the most complex situation
Innovationo AGC Networks is committed to technology innovation. We
deliver solutions across multiple vendors, thereby offering andintegrating vendor-neutral, best-in-class solutions
o Our commitment is illustrated by a $3 mn investment inbuilding AGC’s Mumbai and Dallas-based Customer ExperienceCenters (CEC) - unique facilities showcasing next generationtechnologies in real application settings
8
Exposure of New Cyber Attacks
9
Cybercrime is impacting the global economy significantly
with estimated annual losses of up to $ 575 billion
Cyber attack on Target alone striped banks and credit unions
of $200M
Nearly two-thirds of organizations learn of their
breach from an external source
A typical advanced attack goes unnoticed for nearly eight
months
Attackers are increasingly using outsourced service providers as a means to gain access to their
victims
While organizations have made significant security improvements,
they have yet to keep pace with today’s determined adversaries.
Many still rely on yesterday’s security practices to combat
today’s threats
Technology Solutions
10
Key Features: CYBER-i
Largest and the only “Global Managed Services Partner” ofIntel Security in India
Live Feeds available on Global Threat Intelligence from IntelSecurity
State-of-the-art Global Security Operations Center (G-SoC) inMumbai
Offering advanced services for “0” Day threat defense, activeresponse and integration with all Intel security partners
11
Services Portfolio
12
A team of 65+ qualified, experienced and certified cyber security professionals form the backbone of the services portfolio
Technology Portfolio
13
Managed Security Offerings
Security Incident & Event Monitoring (SIEM)Vulnerability Assessment/Penetration TestingActive Threat Defense- “0” Day ProtectionData Leak PreventionWeb ProxyIntrusion Prevention SystemThreat IntelligenceActive Threat Defense- Anti Virus, Active Response, TIESecurity Device Management
14
CLOUD ON PREMHYBRID
Managed Security Services
15
INTEL SECURITY’s MSSP of the Year 2016: CYBER-i
16
Global Threat Intelligence-Intel Security
17
Threat Intelligence- CYBER-i
18
Threat Intelligence-CYBER-i
19
Total Data :
98,818 Malicious IP’s, Domains & URL’s
IP 83,178DOMAIN = 4,321URL = 11,319
Malware = 3,050Scanning Host = 6,134Ransomware = 1,433Phishing = 7,134Spamming = 1,474Malicious Host = 23,124Defacement = 22TOR = 6,933Service Exploitation = 49,514
Business Challenges
A Dynamic Threat Landscape
Need to create Cyber Threat Awareness at the top level
Risk Perception and Mitigation Strategy
Investments – a must!
Technology Obsolesce – a reality!
Multiple Players with heterogeneous technologies and lack of end
to end offerings
Restricted availability of Skilled Manpower
Compliance adherence
20
MSSP - Know your probable attacker
AGC receives data from Intel Security for billions of IPaddresses and network ports, providing hundreds oftrillions of unique views, and calculates a reputationscore based on network traffic, including port,destination, protocol, and inbound and outboundconnection requests. connections. This data helpsknow your probable attacker well in advance
Protects organisations from botnets, distributed denial-of-service (DDoS) attacks, command and control activity,advanced persistent threats, and risky web connections.
Reduces system and network burden by blocking threats atthe network edge.
Decreases downtime and remediation costs associated withnetwork-based attacks.
21
Know What & How the attacker is attempting
Authentication Failed attempt
on this Device
Root user
Credentials triedTime of Incident
22
Spam Email Traffic - Geo-location / Country
23
Understanding the attack
Remote Shell Success connection from External IP’s by Geo location
24
Track, Correlate, End Points Risks
Events with
Virus infected
file
25
Managed Security Offerings
Threat Monitoring & Incident
Response on 24*7 Basis
Vulnerability Management
Forensic Analysis
Advanced Persistent Threats
GRC Management
Security Device Management
Firewall / IDS / IPS/ NGFW / UTM
WAF / DAM Management
26
The Mobile Wallet Engagement
Cyber Threat
Management01
PCI DSS Consulting02
VM & Application
Security
03
Security Solution
Deployment04
30
Cyber Threat Management
28
Traffic from Malicious Sources
Proactively
Blocked
Continuous Support for
Threat Mitigation &Compliance
Management
Global Security Intelligence
Applied to Local Network
CYBER-i Offering benefits
200+ Incidents Identified
PCI DSS Certification
THE MOBILE WALLET’s PCI DSS CERTIFICATION
29
30
Customer Speak
Let’s Begin!
top related