security powerpoint presentation for customers

15
1 Security from Rogers Presentation All brand names and logos are trademarks of their respective owners. ©2016 Rogers Communications.

Upload: george-zakhem

Post on 10-Feb-2017

70 views

Category:

Documents


0 download

TRANSCRIPT

1

Securityfrom RogersPresentation

All brand names and logos are trademarks of their respective owners. ©2016 Rogers Communications.

2

36%of Canadian businesses were the victims of cyberattacks in the last year.*

is what it can take to detect a breach.*

1,425% is the average ROI for a cybercrime.**

$2.1 trillionwill be the annual cost of breaches by 2019.

What is the impact of cybercrime today?

Security from Rogers

3 months

*Exposing the Cyber Security Cracks: Canada (2014), Ponemon Institute,; Trustwave Global Security Report, 2015**The Future of Cybercrime and Security, Juniper Research, December 5, 2015

Achieving security is easier said than done

of businesses don’t have 24/7 security.

Lack the skills for effective security.

lack access to the necessary tools.

find security too expensive.27%

61% 37% 33%

Source: IDC Canada’s ITAP n3 survey, 2015

Security from Rogers3

4 Security from Rogers

The trouble with traditional security

Traditional options are burdensome to deploy and manage because:

• Multiple parties complicate implementation, support and billing

• Multiple licensing arrangements increase costs

That’s why many businesses turn to managed security solutions as an alternative.

5

As your network carrier, Rogers:

• Knows your network best

• Continues to be a single point of contact

• Keeps your billing simple

Protect data, manage risk and achieve compliance while driving efficiency and innovation.

Why choose security from Rogers?

Security from Rogers

Global reach

Deliveredas a service

6

Security services are purchased for a monthly fee, preparing you to defend against new threats and freeing up your IT professionals to innovate for your core business.

What “as a service” means, and why it matters

Security from Rogers

“As a service” means “managed”, plus:

• Shifting security spending from CapEx to OpEx

• No hardware or software to own

• Reinvesting capital in other areas of your business

OpEx CapEx

7

What “global reach” means, and why it matters

Security from Rogers

“Global reach” refers to our 8 SOCs around the world that:

• Are staffed 24/7 with security experts

• Conduct global research on emerging threats

• Share findings with each other to enhance threat intelligence

Our SOCs are in:• Kitchener-Waterloo• Australia• Chicago, Denver, Minneapolis

• Warsaw

• Singapore

• Manila

Mitigate global threats before they get to Canada with access to a threat intelligence network no other Canadian network carrier can provide.

8

Vulnerability management

Threat management

Compliance management

Proactively search for and strengthen weaknesses

Stop security threats in their tracks

Easily meet compliance mandates

• Blended scanning and testing

• Vulnerability Testing

• Security Information and Event Management (SIEM)

• Firewall Management

• Unified Threat Management (UTM)

• Intrusion Detection/Prevention System (IDS/IPS)

• UTM

• Compliance suite

• Wi-Fi as a Service

• Endpoint suite

Specific security services we offer

Security from Rogers

9

Vulnerability Management Services

Security from Rogers

Blended scanning and testing

Vulnerability Scanning

Have your network scanned and tested by your own staff or by our experts

Prioritize vulnerabilities, learn to fix them and verify remediation over time.

• Conduct self-serve or managed scans

• Run the right tests at the right time

• “Ethical hacks” determine your overall resilience

• Easily generate reports on security progress

• Run regular or ad hoc scans according to your schedule

• Learn about emerging threats with tests and plug-ins

10

Threat Management Services

Security from Rogers

Security Information and Event

Management (SIEM)

Unified Threat Management

(UTM)

Firewall Management

Intrusion Detection/Prevention

System (IDS/IPS)

• Offload tedious log monitoring and complex threat correlation

• Gain visibility into your security network via our customer portal.

• Receive comprehensive protection with one appliance

• Trustwave® devices are offered

• Offload provisioning, deployment, upgrading and patching of Trustwave or third-party firewalls

• Offload security policy updates

• Monitors and blocks data from malicious sources

• Maintain business continuity

• Trustwave devices are offered

11

Compliance Plus

Security from Rogers

UTM Wi-Fi as a Service

Compliance suite

Endpoint suite

• Comprehensive protection with one appliance.

• Cloud-based Wi-Fi infrastructure managed by Rogers, which includes next-gen firewall , IDS/IPS, and identity-based and device-aware security policies.

• Includes Quarterly scanning, data loss prevention, self-assessments, PCI training, policy templates and $100,000 breach protection.

• Includes managed and automated policy, compliance and security controls, file monitoring, device logging and online endpoint monitoring.

12

Secure, cloud-based customer portal

Trustwave SpiderLabs®

• View (or manage) events, alerts, trends, reports and technologies

• Includes easy-to-understand dashboards for monitoring, scanning, testing and compliance

• Interact with the experts at the Kitchener-Waterloo SOC

• Trustwave’s “Spiders” conduct “ethical hacks” – or penetration tests – using cybercriminal methods

• Assesses your resilience to a real attack

• Trustwave is a world leader in the managed security market

Supporting features and staff

Security from Rogers

Security from Rogers

Protect you corporate and customer data

Free up IT for innovation

Meet your regulatory requirements

Security from Rogers

To speak to a representative call 1-866-307-3992

15