security powerpoint presentation for customers
TRANSCRIPT
1
Securityfrom RogersPresentation
All brand names and logos are trademarks of their respective owners. ©2016 Rogers Communications.
2
36%of Canadian businesses were the victims of cyberattacks in the last year.*
is what it can take to detect a breach.*
1,425% is the average ROI for a cybercrime.**
$2.1 trillionwill be the annual cost of breaches by 2019.
What is the impact of cybercrime today?
Security from Rogers
3 months
*Exposing the Cyber Security Cracks: Canada (2014), Ponemon Institute,; Trustwave Global Security Report, 2015**The Future of Cybercrime and Security, Juniper Research, December 5, 2015
Achieving security is easier said than done
of businesses don’t have 24/7 security.
Lack the skills for effective security.
lack access to the necessary tools.
find security too expensive.27%
61% 37% 33%
Source: IDC Canada’s ITAP n3 survey, 2015
Security from Rogers3
4 Security from Rogers
The trouble with traditional security
Traditional options are burdensome to deploy and manage because:
• Multiple parties complicate implementation, support and billing
• Multiple licensing arrangements increase costs
That’s why many businesses turn to managed security solutions as an alternative.
5
As your network carrier, Rogers:
• Knows your network best
• Continues to be a single point of contact
• Keeps your billing simple
Protect data, manage risk and achieve compliance while driving efficiency and innovation.
Why choose security from Rogers?
Security from Rogers
Global reach
Deliveredas a service
6
Security services are purchased for a monthly fee, preparing you to defend against new threats and freeing up your IT professionals to innovate for your core business.
What “as a service” means, and why it matters
Security from Rogers
“As a service” means “managed”, plus:
• Shifting security spending from CapEx to OpEx
• No hardware or software to own
• Reinvesting capital in other areas of your business
OpEx CapEx
7
What “global reach” means, and why it matters
Security from Rogers
“Global reach” refers to our 8 SOCs around the world that:
• Are staffed 24/7 with security experts
• Conduct global research on emerging threats
• Share findings with each other to enhance threat intelligence
Our SOCs are in:• Kitchener-Waterloo• Australia• Chicago, Denver, Minneapolis
• Warsaw
• Singapore
• Manila
Mitigate global threats before they get to Canada with access to a threat intelligence network no other Canadian network carrier can provide.
8
Vulnerability management
Threat management
Compliance management
Proactively search for and strengthen weaknesses
Stop security threats in their tracks
Easily meet compliance mandates
• Blended scanning and testing
• Vulnerability Testing
• Security Information and Event Management (SIEM)
• Firewall Management
• Unified Threat Management (UTM)
• Intrusion Detection/Prevention System (IDS/IPS)
• UTM
• Compliance suite
• Wi-Fi as a Service
• Endpoint suite
Specific security services we offer
Security from Rogers
9
Vulnerability Management Services
Security from Rogers
Blended scanning and testing
Vulnerability Scanning
Have your network scanned and tested by your own staff or by our experts
Prioritize vulnerabilities, learn to fix them and verify remediation over time.
• Conduct self-serve or managed scans
• Run the right tests at the right time
• “Ethical hacks” determine your overall resilience
• Easily generate reports on security progress
• Run regular or ad hoc scans according to your schedule
• Learn about emerging threats with tests and plug-ins
10
Threat Management Services
Security from Rogers
Security Information and Event
Management (SIEM)
Unified Threat Management
(UTM)
Firewall Management
Intrusion Detection/Prevention
System (IDS/IPS)
• Offload tedious log monitoring and complex threat correlation
• Gain visibility into your security network via our customer portal.
• Receive comprehensive protection with one appliance
• Trustwave® devices are offered
• Offload provisioning, deployment, upgrading and patching of Trustwave or third-party firewalls
• Offload security policy updates
• Monitors and blocks data from malicious sources
• Maintain business continuity
• Trustwave devices are offered
11
Compliance Plus
Security from Rogers
UTM Wi-Fi as a Service
Compliance suite
Endpoint suite
• Comprehensive protection with one appliance.
• Cloud-based Wi-Fi infrastructure managed by Rogers, which includes next-gen firewall , IDS/IPS, and identity-based and device-aware security policies.
• Includes Quarterly scanning, data loss prevention, self-assessments, PCI training, policy templates and $100,000 breach protection.
• Includes managed and automated policy, compliance and security controls, file monitoring, device logging and online endpoint monitoring.
12
Secure, cloud-based customer portal
Trustwave SpiderLabs®
• View (or manage) events, alerts, trends, reports and technologies
• Includes easy-to-understand dashboards for monitoring, scanning, testing and compliance
• Interact with the experts at the Kitchener-Waterloo SOC
• Trustwave’s “Spiders” conduct “ethical hacks” – or penetration tests – using cybercriminal methods
• Assesses your resilience to a real attack
• Trustwave is a world leader in the managed security market
Supporting features and staff
Security from Rogers
Security from Rogers
Protect you corporate and customer data
Free up IT for innovation
Meet your regulatory requirements