agc networks limited · this vast experience enables agc to design the perfect solution for even...

Post on 27-May-2020

2 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Ver 4.1_Jun16

AGC Networks LimitedCyber Security Overview

Agenda

2

05

04

03

02

01

Case Study

AGC CLIENTELE

GLOBAL SECURITY OPERATIONS CENTRE

AGC PORTFOLIO

CYBER SECURITY OVERVIEW

Internet - The Powerhouse

3

Few of the Reported Breaches

4

Source: http://www.informationisbeautiful.net/

Hackers steal $10 million from a

Ukrainian bank through SWIFT

loophole

AGC Networks Corporate Overview

A Leading Global Information & Communications Technology (ICT) Solutions Provider, combining expertise with Best-in-Class technology

30 Years Of Experience Across 9 geographies

Serving Over 3000 Customers Partnering

with 20+ Technology Leaders

Global HQ : Mumbai, India

US HQ : Dallas, Texas

– the Cyber Security division of

AGC Networks • ISO/IEC 9001 and 27001:2005 certified, SOC2 Type 1

Certified

Our vision is to deliver enterprise innovation, creating clear and measurable success for our customers

5

Customer Organization Imperatives

CFOImperatives

CEOImperatives

CIOImperatives

• Revenue Growth• Superior Customer Service• Business Efficiency

• Risk & Compliance• Cost Reduction• Cash Flows

• Investment Protection• Return on Technology

Investment • Rapid Deployment

1. Profitable Growth

2. Customer Experience

3. Security & Compliance

4. Operational Efficiencies

Key Focus Areas

6

7

Global Customer Footprint

Why Choose AGC Networks?

Experienceo AGC Networks has installed over 1 mn Unified

Communications ports, 500K data ports and 100K video end-points worldwide. This vast experience enables AGC to designthe perfect solution for even the most complex situation

Innovationo AGC Networks is committed to technology innovation. We

deliver solutions across multiple vendors, thereby offering andintegrating vendor-neutral, best-in-class solutions

o Our commitment is illustrated by a $3 mn investment inbuilding AGC’s Mumbai and Dallas-based Customer ExperienceCenters (CEC) - unique facilities showcasing next generationtechnologies in real application settings

8

Exposure of New Cyber Attacks

9

Cybercrime is impacting the global economy significantly

with estimated annual losses of up to $ 575 billion

Cyber attack on Target alone striped banks and credit unions

of $200M

Nearly two-thirds of organizations learn of their

breach from an external source

A typical advanced attack goes unnoticed for nearly eight

months

Attackers are increasingly using outsourced service providers as a means to gain access to their

victims

While organizations have made significant security improvements,

they have yet to keep pace with today’s determined adversaries.

Many still rely on yesterday’s security practices to combat

today’s threats

Technology Solutions

10

Key Features: CYBER-i

Largest and the only “Global Managed Services Partner” ofIntel Security in India

Live Feeds available on Global Threat Intelligence from IntelSecurity

State-of-the-art Global Security Operations Center (G-SoC) inMumbai

Offering advanced services for “0” Day threat defense, activeresponse and integration with all Intel security partners

11

Services Portfolio

12

A team of 65+ qualified, experienced and certified cyber security professionals form the backbone of the services portfolio

Technology Portfolio

13

Managed Security Offerings

Security Incident & Event Monitoring (SIEM)Vulnerability Assessment/Penetration TestingActive Threat Defense- “0” Day ProtectionData Leak PreventionWeb ProxyIntrusion Prevention SystemThreat IntelligenceActive Threat Defense- Anti Virus, Active Response, TIESecurity Device Management

14

CLOUD ON PREMHYBRID

Managed Security Services

15

INTEL SECURITY’s MSSP of the Year 2016: CYBER-i

16

Global Threat Intelligence-Intel Security

17

Threat Intelligence- CYBER-i

18

Threat Intelligence-CYBER-i

19

Total Data :

98,818 Malicious IP’s, Domains & URL’s

IP 83,178DOMAIN = 4,321URL = 11,319

Malware = 3,050Scanning Host = 6,134Ransomware = 1,433Phishing = 7,134Spamming = 1,474Malicious Host = 23,124Defacement = 22TOR = 6,933Service Exploitation = 49,514

Business Challenges

A Dynamic Threat Landscape

Need to create Cyber Threat Awareness at the top level

Risk Perception and Mitigation Strategy

Investments – a must!

Technology Obsolesce – a reality!

Multiple Players with heterogeneous technologies and lack of end

to end offerings

Restricted availability of Skilled Manpower

Compliance adherence

20

MSSP - Know your probable attacker

AGC receives data from Intel Security for billions of IPaddresses and network ports, providing hundreds oftrillions of unique views, and calculates a reputationscore based on network traffic, including port,destination, protocol, and inbound and outboundconnection requests. connections. This data helpsknow your probable attacker well in advance

Protects organisations from botnets, distributed denial-of-service (DDoS) attacks, command and control activity,advanced persistent threats, and risky web connections.

Reduces system and network burden by blocking threats atthe network edge.

Decreases downtime and remediation costs associated withnetwork-based attacks.

21

Know What & How the attacker is attempting

Authentication Failed attempt

on this Device

Root user

Credentials triedTime of Incident

22

Spam Email Traffic - Geo-location / Country

23

Understanding the attack

Remote Shell Success connection from External IP’s by Geo location

24

Track, Correlate, End Points Risks

Events with

Virus infected

file

25

Managed Security Offerings

Threat Monitoring & Incident

Response on 24*7 Basis

Vulnerability Management

Forensic Analysis

Advanced Persistent Threats

GRC Management

Security Device Management

Firewall / IDS / IPS/ NGFW / UTM

WAF / DAM Management

26

The Mobile Wallet Engagement

Cyber Threat

Management01

PCI DSS Consulting02

VM & Application

Security

03

Security Solution

Deployment04

30

Cyber Threat Management

28

Traffic from Malicious Sources

Proactively

Blocked

Continuous Support for

Threat Mitigation &Compliance

Management

Global Security Intelligence

Applied to Local Network

CYBER-i Offering benefits

200+ Incidents Identified

PCI DSS Certification

THE MOBILE WALLET’s PCI DSS CERTIFICATION

29

30

Customer Speak

Let’s Begin!

top related