managed security services level 3 secure …/media/files/brochures/en_secur_br_secure... · managed...

10
MANAGED SECURITY SERVICES LEVEL 3 SECURE ACCESS AND MOBILITY SERVICES

Upload: tranmien

Post on 09-Mar-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: MANAGED SECURITY SERVICES LEVEL 3 SECURE …/media/files/brochures/en_secur_br_secure... · MANAGED SECURITY SERVICES ... security policies of your MPLS/IP VPN core network to all

MANAGED SECURITY SERVICESLEVEL 3 SECURE ACCESS AND MOBILITY SERVICES

Page 2: MANAGED SECURITY SERVICES LEVEL 3 SECURE …/media/files/brochures/en_secur_br_secure... · MANAGED SECURITY SERVICES ... security policies of your MPLS/IP VPN core network to all

BY 2015 IT IS EXPECTED THAT THE WORLD’S MOBILE WORKER POPULATION WITH REACH 1.3 BILLION OR 37.2% OF THE TOTAL GLOBAL WORKFORCE.

(IDC WORLDWIDE MOBILE WORKER POPULATION 2011-2015 FORECAST DOC#232073)

Page 3: MANAGED SECURITY SERVICES LEVEL 3 SECURE …/media/files/brochures/en_secur_br_secure... · MANAGED SECURITY SERVICES ... security policies of your MPLS/IP VPN core network to all

Let’s face it – your business is under assault on a daily basis.

Security risks to your organization manifest in a variety of ways: operational challenges,

network vulnerabilities and continuously evolving cyber threats. In order to limit your

exposure, you need a managed security platform and service that allows security concerns

to be anticipated and corrective action taken proactively – before critical business operations

are affected. Addressing security risk management as a structured business process,

rather than just blocking threats and fixing vulnerabilities, creates greater value in terms of

technology efficiency, resource allocation and security compliance.

STAY CONNECTED SECURELY

Today’s global business spans multiple locations and requires comprehensive mobile

workforce management. Whether you are a large multinational corporation or a regionally

based business, chances are you need to provide both resources and support to multiple

buildings, partners and mobile employees.

As your organization grows and the “Bring Your Own Device” (BYOD) trend grows, so does the

complexity of ensuring secure connectivity to your corporate resources and the challenge of

enforcing IT security policies.

PROTECT WHAT IS MOST IMPORTANT.

Page 4: MANAGED SECURITY SERVICES LEVEL 3 SECURE …/media/files/brochures/en_secur_br_secure... · MANAGED SECURITY SERVICES ... security policies of your MPLS/IP VPN core network to all

SIMPLIFY YOUR BUSINESS SECURITY STRATEGYWe can help. Level 3’s portfolio of secure access and mobility services help solve security concerns by protecting and monitoring your company’s infrastructure at multiple levels.

Features

24 x 7 monitoring and management via dedicated Security Operations Centers

Security analytics tool with real-time reporting

Fully developed Security Incident and Event Monitoring (SIEM) capability

Network-based or premises based managed Security options

Customer Benefits

“Always On” protection with access to security experts and best practices

Proactive cyber threat identification and management to stay ahead of evolving threats

Secure connections to company resources and applications

EXPERT SERVICE MANAGEMENT: MONITORING, THREAT ANALYSIS AND MITIGATIONLevel 3’s Security Operations Center (SOC) leverages global IP, DNS and CDN networks to gain visibility into potential cyber threats. Two mirrored sites enable concurrent site level business continuity and disaster recovery.

Rely on the Level 3 SOC Proactive detection and mitigation of security threats.

Reactive response to security issues including physical and logical alarms, attacks, suspicious or other abnormal network activities.

24 x 7 monitoring and ‘follow the sun’ support provides proactive vigilance against internal and external threats.

Ensures information confidentiality, integrity, and availability.

Our dedicated SOC monitors the health and availability of any security appliances deployed on your premises or within our network on a 24 x 7 basis. Event logs and alerts generated by our security assets are correlated, classified and analyzed using our customized SIEM (Security Incident and Event Monitoring) platform. Level 3’s skilled security analysts interpret this information and will work closely with your IT or security personnel to manage any potential network threat. We will proactively investigate incidents, analyze the likelihood and impact of threats on your critical network assets, and respond quickly and appropriately.

Customer Portal and Security AnalyticsIn addition to our Security Operations team support, your organization requires real-time, any-time access to your data. The MyLevel3SM Customer Portal and Security Analytics Tool provides the reporting you need to manage your specific security implementation.

Complete view of security platform for policies, configuration

Consolidated tool provides a single point of reference to monitor cyber security events in real time and track user activity.

Manipulate and filter data to create custom downloadable reports.

Administer security policies and configurations online through tickets to the SOC.

Complete view of security platform for policies, configuration rules, consumption data and security elements

Real-time reporting on device health and availability of your security appliances managed by Level 3.

Page 5: MANAGED SECURITY SERVICES LEVEL 3 SECURE …/media/files/brochures/en_secur_br_secure... · MANAGED SECURITY SERVICES ... security policies of your MPLS/IP VPN core network to all

OUR DEDICATED SOC MONITORS THE HEALTH AND AVAILABILITY OF ANY SECURITY APPLIANCES DEPLOYED ON YOUR PREMISES OR WITHIN OUR NETWORK ON A 24 X 7 BASIS.

Page 6: MANAGED SECURITY SERVICES LEVEL 3 SECURE …/media/files/brochures/en_secur_br_secure... · MANAGED SECURITY SERVICES ... security policies of your MPLS/IP VPN core network to all

It’s the new reality: as your business grows and succeeds, the threat of security attacks can increase. At the same time, demand for access to your corporate network is accelerating with BYOD trends, increased teleworking, new vendor partnerships and the incorporation of small remote offices. Every connection adds another potential point of vulnerability to your infrastructure. Simply limiting access restricts productivity and inhibits network sophistication. How can you cost-effectively extend the security policies of your MPLS/IP VPN core network to all users?

Level 3 Secure Access Services can help improve employee productivity by allowing fixed remote locations (branch sites or home offices) and mobile users to securely connect for safe access to your network anywhere, any time.

SECURELY ENABLE BYOD ON YOUR NETWORKLevel 3SM Secure Access Mobility Service service connects remote users or teleworkers to your network via IPsec and SSL-based Internet connections and a standard web browser. Whether they connect with a laptop, tablet or smartphone, you have the ability to securely manage employee remote connectivity in a BYOD environment. Level 3 security experts assess your mobile computing needs and deploy a solution that removes complexity while delivering the security you need.

SECURE ACCESS TO YOUR NETWORK AND CORPORATE ASSETS

• Centralized management for Authentication, User Role Mapping, Resource Policies and Sign-in Policies.

• Access permitted or denied based on user roles and resource policies using software clients, SSL VPN capabilities, Web URL Access, remote terminal services and remote file sharing.

• Remote device security through various authentication systems to include Windows® Active Directory®, LDAP and RADIUS.

• Mobile and local device support; covering Windows®, MAC, Linux®, AndroidTM and Apple® iOS platforms.

• Globally dispersed VPN Gateways, strategically positioned for low-latency and jitter.

SECURE ACCESS MOBILITY SERVICE KEY FEATURES

Page 7: MANAGED SECURITY SERVICES LEVEL 3 SECURE …/media/files/brochures/en_secur_br_secure... · MANAGED SECURITY SERVICES ... security policies of your MPLS/IP VPN core network to all

Level 3SM Secure Access Site service provides a reduced cost, highly secure option for you to extend your VPN to branch offices. Connect all business locations while ensuring your data remains unmodified in transit and secure from unwanted intruders. This solution links small, fixed-site offices to the corporate network over an existing internet connection, effectively eliminating the need for all sites to have a direct connection to your VPN. Let Level 3 manage Secure Access for you to help maintain secure business operations.

EXPERT TESTING, DESIGN AND PLANNINGIn today’s ever-changing threat environment, an organization without a comprehensive security plan is at a distinct disadvantage. The use of wireless networks is rising. More employees are accessing critical information remotely as organizations become mobile and dispersed. Social network sites are gaining widespread adoption. Businesses are moving their processes and applications to the cloud.

With Level 3 SM Security Consulting services, we can help ensure that your network is protected, with the right policies in place to effectively guard against or respond to an attack. Our consultative approach to network security draws upon multiple sources, including the security and IT policy needs of your organization, our experience of managing varied, global networks and IT environments and industry best practices.

SECURE REMOTE CONNECTIVITY AND NETWORK BACKUP

• Understanding your current security posture and business objectives.

• Identifying your critical applications and how they are currently secured.

• Determining gaps in your current architecture and policy through vulnerability assessments and penetration testing.

• Working with you to define a security strategy with a recommended implementation plan, based on business priorities and your return on investment (ROI) objectives.

• Reviewing how Governance, Regulation and Compliance (GRC) mandates affect your business.

• Working with your IT teams to translate your network security requirements into policies that we can implement, manage and monitor on your behalf.

• Mitigation assistance from our incident response team in the event of a security breach.

OUR APPROACH INVOLVES

Page 8: MANAGED SECURITY SERVICES LEVEL 3 SECURE …/media/files/brochures/en_secur_br_secure... · MANAGED SECURITY SERVICES ... security policies of your MPLS/IP VPN core network to all

Continuity of Operations. With the sophistication and complexity of attacks, enterprises typically do not have the internal resources or knowledge base to manage risk to their network. Level 3 has the analytical tools and people in place to see threats and attacks across multiple network service portfolios.

Manage Risk to Your Brand and Intellectual Property. The volume and complex nature of threats to your organization’s proprietary data requires the coordinated efforts of knowledgeable personnel, on duty every minute of every day. Level 3’s Security Operations Center (SOC) provides 24 x 7 monitoring and threat analysis.

Manage Operational Complexity. Cyber threats are constantly changing in form, volume, timing and points of origin. Most organizations do not have the budget to hire experts to manage these dynamics, and also focus on their core business. Level 3 uses our integrated security and network capabilities to stay on top of events across global infrastructures.

WHY CHOOSE LEVEL 3 FOR SECURITY SERVICES?

Page 9: MANAGED SECURITY SERVICES LEVEL 3 SECURE …/media/files/brochures/en_secur_br_secure... · MANAGED SECURITY SERVICES ... security policies of your MPLS/IP VPN core network to all

IF YOU’D LIKE TO FIND OUT MORE, PLEASE CONTACT YOUR ACCOUNT REPRESENTITVE; CALL 877.2LEVEL3, EMAIL [email protected] OR VISIT WWW.LEVEL3.COM

Page 10: MANAGED SECURITY SERVICES LEVEL 3 SECURE …/media/files/brochures/en_secur_br_secure... · MANAGED SECURITY SERVICES ... security policies of your MPLS/IP VPN core network to all

We build, operate and take end-to-endresponsibility for the network solutions thatconnect you to the world. We put customers firstand take ownership of reliability and securityacross our broad portfolio.

© 2015 Level 3 Communications, LLC. All Rights Reserved. Level 3, Level 3 Communications, the Level 3 Communications Logo, the Level 3 logo and “Connecting and Protecting the Networked World” are either registered service marks or service marks of Level 3 Communications, LLC and/or one of its Affiliates in the United States and/or other countries. Level 3 services are provided by wholly owned subsidiaries of Level 3 Communications, Inc. Any other service names, product names, company names or logos included herein are the trademarks or service marks of their respective owners. Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Any other service names, product names, company names or logos included herein are the trademarks or service marks of their respective owners. PN# 153050 01/15