DIGITAL PLANETS SECURITY SOLUTION INTRODUCTION OUR OFFERED - - PowerPoint PPT Presentation

digital planets security solution
SMART_READER_LITE
LIVE PREVIEW

DIGITAL PLANETS SECURITY SOLUTION INTRODUCTION OUR OFFERED - - PowerPoint PPT Presentation

DIGITAL PLANETS SECURITY SOLUTION INTRODUCTION OUR OFFERED SERVICES Vulnerability Security Information Assessment Brand Operation Consultancy & Security Protection Penetration Awareness Centre Testing External Networks


slide-1
SLIDE 1

DIGITAL PLANETS SECURITY SOLUTION

slide-2
SLIDE 2

INTRODUCTION

OUR OFFERED SERVICES

Vulnerability Assessment & Penetration Testing

  • External Networks
  • Internal Networks
  • Web Applications
  • Mobile Applications
  • Social Engineering
  • Red Teaming

Security Operation Centre

  • SOC Hybrid

Solutions

  • Planning,

Designing & Building SOC

  • Upgrading NOC to

SOC

  • Implementing

Security policies & procedures

Information Security Awareness

  • ISA for End Users
  • ISA for Managers
  • ISA for IT Admin
  • ISA for Developers
  • Compliance &

Governance

  • Communication

Tools

  • Phishing Simulator

Brand Protection

  • Anti-Phishing
  • Mobile Apps
  • Social Media
  • Malware Protection
  • DMARC

Consultancy

  • Risk Assessment
  • Configuration

Reviews

  • Source Code

Review

  • PCI & ISO 27001
  • Governance
slide-3
SLIDE 3

INTRODUCTION

OUR PARTNERS

slide-4
SLIDE 4

INTRODUCTION

REFERENCE LIST

slide-5
SLIDE 5

INTRODUCTION

WHY DIGITAL PLANETS SECURITY SOLUTIONS?

  • Experienced team with more than 30 years of cumulated professional experiences
  • 100% Focused on Cyber Security professional services
  • On board professional calibers including consultants, engineers and analysts
  • Partnership with best of bread technology providers in the industry
  • Professional 24/7/365 Security Operation Center (Smart Village – Egypt)
  • Fast growing company based on exemplary project’s success rate
  • Prestigious reference list including mission critical clients
  • Full fledge professional security services offering
  • Capacity to communicate in different languages including Arabic, English and French
slide-6
SLIDE 6

INFORMATION SECURITY AWARENESS

slide-7
SLIDE 7

INFORMATION SECURITY AWARENESS

SECURING THE WEAKEST LINK

slide-8
SLIDE 8

INFORMATION SECURITY AWARENESS

SECURING THE WEAKEST LINK

slide-9
SLIDE 9

INFORMATION SECURITY AWARENESS

SECURING THE WEAKEST LINK

slide-10
SLIDE 10

INFORMATION SECURITY AWARENESS

CONTENT DELIVERY HAS NEVER BEEN THIS EASY

slide-11
SLIDE 11

INFORMATION SECURITY AWARENESS

ENSURE YOUR PROGRAMMES SUCCESS

slide-12
SLIDE 12

BRAND PROTECTION & FRAUD MANAGEMENT

slide-13
SLIDE 13

BRAND PROTECTION

PROVEN AND TRUSTED GLOBALLY

  • A privately owned Internet Security company
  • Founded in 2003
  • Leaders in the Anti-Phishing and Online Brand Protection Industry
  • Headquartered in Melbourne, Australia
  • Offices in San Francisco, Dubai and London
  • 24x7x365 Security Operations Centre
slide-14
SLIDE 14

BRAND PROTECTION

ENTERPRISE BRAND PROTECTION SUITE

  • Brand Abuse
  • Vishing
  • Pharming
  • LogMonitor*
  • Interceptor*
  • PAC Files
  • Command and Control
  • Drop Zones
  • Brand Impersonation
  • Executive

Impersonation

  • Unauthorised Mobile

App listings

  • Malicious Android &

iPhone apps

slide-15
SLIDE 15

MANAGED SECURITY SERVICES

slide-16
SLIDE 16

SECURITY OPERATIONS CENTRE ‘SOC’

A Security Operations Centre (SOC) is a centralized unit in an organization that deals with security issues/incidents, on an organizational and technical level.

  • SOC team operates 24/7 from central offsite location or outsourced on clients’ site.
  • Complete & proactive in response to security incidents.
  • Predict security attacks and minimize the impact.
  • Implement security policies across the enterprise.
  • Reduce cost of security support by providing centralized remote support.

MANAGED SECURITY SERVICES

slide-17
SLIDE 17

MANAGED SECURITY SERVICES

COMPONENTS OF SOC

People Processes Technology

Our Managed SOC is designed to wrap experienced People and efficient Processes around leading Technologies. The objective is to manage security incidents, ensuring they are properly identified, analyzed, communicated, actioned/defended, investigated and reported.

slide-18
SLIDE 18

MANAGED SECURITY SERVICES

People

Different layers of very talented candidates with a broad range of capabilities & diversity of experiences.

TIER 1

  • Monitoring
  • Open tickets, closes false positives
  • Basic investigation and mitigation

TIER 2

  • Deep investigations
  • Mitigation/recommends changes

TIER 3

  • Advanced investigations
  • Prevention
  • Threat hunting
  • Forensics
  • Counter-Intelligence
slide-19
SLIDE 19

MANAGED SECURITY SERVICES

Processes

Our policy and procedure development process consist of four primary steps:

Document Release &

Implementatio n

Document Review

Policy & Procedure Developmen t

Informatio n Gathering

slide-20
SLIDE 20

MANAGED SECURITY SERVICES

Technology

A comprehensive approach of security monitoring is followed by taking care of all the administrative activities required to manage the health and availability of the SOC monitoring tools.

  • Vulnerability Assessment
  • Vulnerability Tracking
  • Log Management
  • Control
  • Visibility
  • Network Infrastructure
  • Events Collection, Correlation

& Analysis

slide-21
SLIDE 21
slide-22
SLIDE 22

Our Unified Approach to Security Monitoring

Unified Security Management (USM)

Centralized threat detection & incident response made simple & affordable for resource-limited IT security teams.

Integrated Threat Intelligence

Actionable threat intelligence updates from AlienVault Labs delivered continuously to the USM platform. Correlation rules and directives written by our AlienVault Labs team and displayed through the USM interface

Open Threat Exchange

The world’s largest repository of crowd-sourced threat data providing a continuous view of real time threats that may have penetrated the company’s defenses.

slide-23
SLIDE 23

OPEN THREAT EXCHANGE (OTX)

slide-24
SLIDE 24

MANAGED SECURITY SERVICES

UNIFIED SECURITY MANAGEMENT

slide-25
SLIDE 25
slide-26
SLIDE 26
slide-27
SLIDE 27

UNIFIED SECURITY MANAGEMENT

AV Components Appliances: Sensor – Server – Logger and ALL-IN-ONE

USM Server

  • Log Normalization
  • IDS
  • OSSEC
  • Netflow
  • Vulnerability Detection
  • Asset Detection

USM Sensor

  • Event Correlation
  • Event Storage/Query
  • UI
  • Long-Term
  • Log Storage/Query

USM Logger USM All-In-One

  • Sensor
  • Server
  • Logger
slide-28
SLIDE 28

AV COMPONENTS FLOW

slide-29
SLIDE 29

UNIFIED SECURITY MANAGEMENT

slide-30
SLIDE 30

BUILDING SOC

To build an efficient SOC, it is important that realistic understanding of many constraints are considered to ensure that an effective solution is in place.

slide-31
SLIDE 31

BUILDING SOC PHASES

BUILD OPERATE PLAN

  • SOC Strategy
  • SOC Capabilities

Maturity Assessment:

  • Infrastructure
  • Data Collection
  • Event Correlation & Data

Analysis

  • Incident Response Plan
  • Vulnerability Managemen
  • Processes
  • Ticketing System Process
  • Collect Measurements
  • Continuous Assessments
  • Incident Response
  • People
  • Process
  • Technology
slide-32
SLIDE 32

INCIDENT RESPONSE

INCIDENT RESPONSE PLAN

There are many levels of success in defensive work… the common wisdom is that the attacker only has to be right once, but the defender has to be right every time. When the worst-case scenario becomes reality, it’s essential to have the right plan in place, the right people

  • n the job, and the right tools and training to remain

vigilant.

slide-33
SLIDE 33

APPROACH

slide-34
SLIDE 34

INCIDENT RESPONSE

UNIQUE APPROACH TO INCIDENT RESPONSE

slide-35
SLIDE 35

INCIDENT RESPONSE

UNIQUE APPROACH TO INCIDENT RESPONSE

slide-36
SLIDE 36

REPORTING

MANAGED SECURITY SERVICES

Our SOC team provides advanced monthly, weekly and daily reports as required for compliance and visibility. Reporting from SOC team and their tools is used to maintain a view of the threat and vulnerability landscape as well as maintain

  • versight of service delivery; both for the service provisioned by

MNZ Technology as well as the internal support team.

slide-37
SLIDE 37

PERSONNEL

SOC ANALYST TIER ‘1’ QUALIFICATIONS -1

  • A Bachelor's Degree in a relevant area of study with a preference for Information Security,

Computer Science or Computer Engineering

  • 1-3 years previous SOC Experience.
  • Basic knowledge of client-server applications, multi-tier web applications, databases,

firewalls, VPNs, and enterprise Anti-Virus products

  • Good knowledge of IT including multiple operating systems and system administration skills
  • Security monitoring experience with one or two SIEM technologies, and intrusion detection

technologies

  • Experience with web content filtering technology - policy engineering and troubleshooting
  • Strong understanding of security incident management, malware management and

vulnerability management processes

slide-38
SLIDE 38

PERSONNEL

  • Detail oriented with strong organizational and analytical skills
  • Strong written communication skills and presentation skills
  • Self-starter, critical and strategic thinker, negotiator and consensus builder
  • Excellent English written and verbal skills.
  • Shift work required & after-hours availability required

SOC ANALYST TIER ‘1’ QUALIFICATIONS -2

slide-39
SLIDE 39

PERSONNEL

SOC ANALYST TIER ‘2’ QUALIFICATIONS -1

  • Three plus years of information security related experience, in areas such as: security
  • perations, incident analysis, incident handling, and vulnerability management or

testing, log analysis, intrusion detection

  • Must have been in a level 1 SOC Analyst role for at least 1-2 years
  • In depth experience with the following technologies: leading SIEM technologies,

IDS/IPS, network- and host- based firewalls, data leakage protection (DLP), DAM (Database activity monitoring)

  • In depth, hands-on experience with at least two of the following technologies: Active

Directory, Routers /Switches management, Firewall Management, IDS/HDS, System vulnerability scanning tools, Application/Database vulnerability scanning tools, mobile device analysis or Secure coding

  • Advanced knowledge of ‘Arcsight’ SIEM solution.
slide-40
SLIDE 40

PERSONNEL

SOC ANALYST TIER ‘2’ QUALIFICATIONS -2

  • In depth understanding of possible attack activities such as network probing/

scanning, DDOS, malicious code activity and possible abnormal activities, such as worms, Trojans, viruses, etc.

  • Experience with SOC ticketing systems and proven SOC process knowledge
  • Advanced knowledge in system security architecture and security solutions
  • Advanced knowledge in networking, message transport, and endpoint security
  • Excellent interpersonal and organizational skill and excellent oral and written

communication skills

  • Proven analytical and problem-solving skills
slide-41
SLIDE 41

PERSONNEL

‘SIEM ADMIN’ QUALIFICATIONS -1

  • Bachelor’s degree in Computer Science or Business Administration, or relevant

educational or professional experience.

  • 2+ years of being a Level 2 Engineer
  • Technical and architectural understanding of large environments
  • An understanding of the following technologies: SIEM technology ArcSight, IDS/IPS,

network- and host- based firewalls, anti-virus software, data leakage protection (DLP), DAM (Database activity monitoring).

  • Knowledge of risk assessment tools, technologies and methods.
  • Experience planning, researching and developing security policies, standards and

procedures

slide-42
SLIDE 42

PERSONNEL

‘SIEM ADMIN’ QUALIFICATIONS -2

  • Professional experience in a system administration role supporting multiple platforms

and applications

  • Ability to communicate network security issues to peers and management
  • Hands-on experience with at least two of the following technologies: Active Directory,

Routers /Switches management, Firewall Management, IDS/HDS, System vulnerability scanning tools, application/database vulnerability scanning tools, mobile device analysis or Secure coding.

  • In depth understanding of possible attack activities such as network probing/

scanning, DDOS, malicious code activity and possible abnormal activities, such as worms, Trojans, viruses, etc.

  • Excellent interpersonal and organizational skills
  • Excellent oral and written communication skills
slide-43
SLIDE 43

PERSONNEL

‘SOC LEAD’ QUALIFICATIONS

  • 7-9 years of technical experience in Information Security, System Administration, or

Network Engineering with at least 5 years of experience in Information Security. Experience in Security Operations and Incident Response.

  • Detailed practical and configuration knowledge of firewalls, load balancers, routers,

switches, intrusion detection/prevention systems.

  • Ability to conduct multi-step breach and investigative analysis to trace the dynamic

activities associated with advanced threats.

  • Advanced knowledge and expertise of using SIEM technologies for event investigation.
  • Advanced knowledge in system security architecture and security solutions
  • Excellent interpersonal and organizational skill and excellent oral and written

communication skills

  • Proven analytical and problem-solving skills
slide-44
SLIDE 44

THANK YOU

FOR ANY FURTHER INFORMATION PLEASE CONTACT:

55 Street 263, Maadi, Cairo, Egypt +2 010000 15 377 digital-planets.net info@digital-planets.net