Beyond Point Technology and The Managed Security Service Provider (MSSP)
Managed Security Services Provider (MSSP) Program
-
Upload
datacenters -
Category
Technology
-
view
1.038 -
download
0
Transcript of Managed Security Services Provider (MSSP) Program
Lower Total Cost of Ownership (TCO)
Reduced Reliance on Internal Sta�
Managing world-class security is a high-maintenance, capital, and resource-intensive endeavor full of pitfalls and potential risk. Outsourcing to an industry leader like FishNet Security can help lower your TCO, while improving your security posture.
Outsourcing of critical security operations shifts functional
provider, thereby enhancing your core
levels to other priorities.
SecurityWhile organizations work extremely hard to keep focus on their core business strategy, their security infrastructure can sometimes be overlooked or worse, even come as an afterthought. Outsourcing of your critical security operations to a focused team of security professionals
cleaning up after a security incident, to preventing it from ever happening
TechnologyStaying on top of the security technology curve is an expensive and resource-intensive activity. FishNet Security has the dedicated resources to assist you in the evaluation, deployment and management of emerging security technologies.
FishNet Security’s managed services SOC (Security Operations Center) is a specially designed, 15,000 square-foot, state of the art facility that provides secure; 24x7x365 centralized monitoring, management, and support of your critical security infrastructure.
Video surveillance, physical security controls, generator backup, UPS
suppression systems ensure 24/7 availability. Mission-critical infrastructure is fully redundant, thereby eliminating any single points of failure.
Our SOC has an isolated security lab equipped with all the latest security devices/software from top-tier security vendors that enables us to emulate our customer’s security environments, and fully test new
policy changes prior to actually implementing into your production environment.
• Commitment to excellence• Award winning service provider
• Trusted security advisor and partner
• Highly skilled and certi�ed security professionals
• Local & nationally positioned technical resources
• Best-of-breed support for third-party devices
• Multi-vendor 24x7 break-�x telephone Support
• Guaranteed responsiveness
• Tiered service options
Managed Security ServicesProvider (MSSP) Program
MSS Program Values Security OperationsCenter (SOC)
FishNet Security Value
1710 Walnut St. / KANSAS CITY, MO 64108 / toll-free: (888)732.9406© Copyright 2007. FishNet Security. All rights reserved.
OverviewFishNet Security, a nationally respected information security solutions provider and integrator, has brought together an extensive, yet
services to create the very best in Managed Security Services (MSS) . The goal of FishNet Security’s Managed Security Services (FNS-MSS) is to enable organizations to focus on their core business objectives and improve their security posture while reducing operating costs.
Our managed security service platform allows the dynamic provisioning of managed services in a manner that can be individually tailored to meet your unique security and budgetary requirements. Our
in faster time to market, lower capital expenditures, reduced operating expense, improved security posture, problem resolution, 24x7x365 support, and access to specialized security training.
FishNet Security’s Managed Security
utilizing both premise-based devices and hosted security platforms:
Managed Firewall
Managed SSL VPN Secure Remote Access
Managed Strong Authentication
Managed IDS / IPS
Security Device and Log Management
Continuous Threat Management
Services Overview:
Common Supported Firewall Platforms:
With easy plug-and-play setup, state-of-the-art Juniper Networks® securityappliances and Check Point FW-1 VPN-1® technology are positioned to secure and
Managed Firewall ServicesManaged Firewall
1710 Walnut St. / KANSAS CITY, MO 64108 / toll-free: (888)732.9406
Firewall site assessment and strategic network design guidance
24x7x365 Firewall device monitoring and management
24x7x365 Break-Fix telephone support and emergency response
Device health and performance monitoring
Change management and auditing
Comprehensive reporting; on-demand and scheduled
Firewall fault analysis and problem resolution
Gateway-to-gateway VPN connections - add on
End-user-to-gateway VPN connections - add on
Enterprise
Check Point FW-1 / VPN-1®
Juniper Networks®Cisco®
Nokia® Crossbeam Systems® Secure Platform®
Overview
Managed Firewall Services fromFishNet Security have been designedto align with your organization’ssecurity initiatives and budgetaryrequirements, via two Managed
and Enterprise. Our Managed Firewall
to meet the unique requirements oftoday’s diversely connectedenterprises.
Enterprise Managed Firewallmanagement solution where FishNet Security is solely responsible for the
professionals that will work with your security contacts to: review, validate,
the service level agreement.
© Copyright 2007. FishNet Security. All rights reserved.
Essential Managed Firewallmanagement solution where FishNet Security validates changes proposed by you,which you then implement under the guidance/assistance of FishNet Security.
Agreement (SLA).
Services Overview:
Managed Firewall ServicesManaged Firewall
1710 Walnut St. / KANSAS CITY, MO 64108 / toll-free: (888)732.9406
24x7x365 Firewall device monitoring
24x7x365 Break-Fix telephone support
Device health and performance monitoring
Firewall Monitoring & Change Management
Firewall fault Analysis
Vendor RMA Assistance
Firewall upgrades / Patch Management - add on
Gateway-to-gateway VPN connections - add on
End-user-to-gateway VPN connections - add on
Essential
Common Supported Firewall Platforms:
With easy plug-and-play setup, state-of-the-art Juniper Networks® securityappliances and Check Point FW-1 VPN-1® technology are positioned to secure and
Check Point FW-1 / VPN-1®
Juniper Networks®Cisco®
Nokia® Crossbeam Systems® Secure Platform®
Overview
Managed Firewall Services fromFishNet Security have been designedto align with your organization’ssecurity initiatives and budgetaryrequirements, via two Managed
and Enterprise. Our Managed Firewall
to meet the unique requirements oftoday’s diversely connectedenterprises.
© Copyright 2007. FishNet Security. All rights reserved.
Services Overview:
Common Supported Secure Remote Access Platforms:
With easy plug-and-play setup, state-of-the-art EMC / RSA SecurID® technology, coupled with Juniper Network’s SA product group, we are well positioned to
future growth and functionality.
Managed SSL/VPNManaged SSL/VPN
1710 Walnut St. / KANSAS CITY, MO 64108 / toll-free: (888)732.9406
Overview
Managed SSL VPN Secure Remote Access combines VPN and endpoint security, policy setting, scanning, and enforcement into a single, clientless system for the lowest total cost of ownership. Our Managed SSL VPN platform enables direct management of account creation/deletion in real-time through integration with your existing authentication servers. FishNet Security’s secure remote access solution was built as a full service package that combines SSL VPN and Strong Authentication into a single service, all covered by 24x7x365 proactive monitoring and support.
Site assessment and strategic network design guidance
Security policy design, equipment installation and
Manager software or appliance
24x7x365 SSL VPN and Authentication device monitoring
24x7x365 Break-Fix telephone support
Solution health and performance monitoring
User provisioning; account creation/deletion, logging, and auditing
Client change requests are validated and authorized prior to being implemented
Token life cycle management and token provisioning
Continuous platform tuning and security policy optimization
Fault/Problem Analysis
Vendor RMA Assistance
Secure Remote Access
Juniper Networks® SA Appliance
EMC / RSA SecurID® Appliances and Tokens
© Copyright 2007. FishNet Security. All rights reserved.
Services Overview:
Common Supported Strong Authentication Platforms:
With easy plug-and-play setup, state-of-the-art EMC/RSA Authentication Manager and SecurID® technology are well positioned to manage secure access in to our
Managed Strong AuthenticationManaged Authentication
1710 Walnut St. / KANSAS CITY, MO 64108 / toll-free: (888)732.9406
Overview
Managed Strong Authentication from FishNet Security has been developed as a robust, on-site or hosted strong authentication service, with lifecycle token management and provisioning, all covered by 24x7x365 proactive monitoring and support.
Manager software or appliance
24x7x365 device monitoring
24x7x365 Break-Fix telephone support
Solution health and performance monitoring
Comprehensive reporting; on-demand and scheduled
User provisioning; account creation/deletion, logging, and auditing
Client change requests are validated and authorized prior to being implemented
Token life cycle management and token provisioning
Continuous platform tuning and security policy optimization
Fault/Problem Analysis
Vendor RMA Assistance
on-site or hosted
EMC / RSA SecurID® Appliances and Tokens
© Copyright 2007. FishNet Security. All rights reserved.
Services Overview:
Managed IDS/IPSManaged IDS/IPS
1710 Walnut St. / KANSAS CITY, MO 64108 / toll-free: (888)732.9406
Overview
Detection and Prevention
FishNet Security's established partnerships with state of the art solution providers to provide the delivery of a comprehensive, best of breed o�ering for security event correlation, threat prevention, device monitoring, security measurement, and compliance management. Using advanced, industry proven technology, acts as an on-site data collector connected to all systems under management. Once relevant data collected on-site, security events that exceed de�ned thresholds are securely transmitted back to the SOC.
© Copyright 2007. FishNet Security. All rights reserved.
Site assessment and strategic network design guidance
IDS/IPS and event collection device installation, con�guration and tuning
Create initial policy; update and tune policy on an ongoing basis
24x7x365 device monitoring
24x7x365 log monitoring, analysis, correlation, and event noti�cation
24x7x365 Break-Fix telephone support
Device health and performance monitoring
Full backup and recovery of con�gurations and security policies
Continuous device upgrades, patch management and device con�guration maintenance
Network event monitoring
Comprehensive reporting
Real-time reporting and alerting on de�ned thresholds for all security events exceeding baseline
Customer noti�cation of major security, health, intrusion events
Incident Response and Computer Forensics – Add on
Common Supported Intrusion Detection/Prevention Platforms:
Juniper Networks® IDP
McAfee IntruShield® IPS
IBM/ISS RealSecure IDS
IBM/ISS Proventia IPS
Managed Intrusion Prevention / Event Monitoring service o�ers 24x7x365 management and monitoring of state of the art prevention technologies. Given our extensive security experience, FishNet Security is in a unique position to create a policy that is appropriate for the customer’s identi�ed data �ows. This managed service, coupled with our pro-active event monitoring partnership will baseline your network tra�c to determine what tra�c should be blocked. After extensive tuning and customer approval, the active blocking mode is enabled. These policies are augmented as vendors release updates and as new threats emerge.
Network based prevention services identify exposures and weak spots within your network using proven tools and de�ned policy based upon network data �ow. Using state-of-the-art Juniper Networks® IDP technology, we are well positioned to detect, prevent, and report on identi�ed vulnerabilities.
Services Overview:
Managed Security Device & Log Management
Managed Devices and Data
1710 Walnut St. / KANSAS CITY, MO 64108 / toll-free: (888)732.9406
Overview
Security Device & Log Management
Con�guration Management utilizes our proprietary FireMon® device management platform to complete the change management process by monitoring, logging, and auditing con�guration changes to network and security devices in real time. This service provides a vast array of bene�ts by allowing your security team to gain a holistic understanding of your security asset status, con�guration, security posture, and compliance adherence. In addition, FishNet Security can securely archive con�guration and audit data for up to seven years to help organizations meet regulatory and compliance requirements.
Device and log collection appliance installation, con�guration and tuning
24x7x365 device monitoring
24x7x365 log monitoring, analysis, correlation, and event noti�cation
24x7x365 Break-Fix telephone support
Device status, health, and performance monitoring
Full backup and recovery of con�gurations and security policies
Device security and con�guration changes are recorded in real-time
Compare running device con�gurations against corporate security policies
Audit and report on the Who, What, When and Why of policy or con�guration changes
Compare device con�guration and changes
Asset-centric, real-time inventory and status reporting
Comprehensive reporting; on-demand and scheduled
Historical tracking/reporting of performance and change statistics
Con�guration revision control and archival
Common Supported Intrusion Detection/Prevention Platforms:
Check Point®: SmartCenter, CMA, FW-1 (AI, NGX), SPLAT
Cisco®: PIX/ASA �rewalls, VPN Concentrator, IOS, CSM, switches, routers
Nokia®: IPSO
Juniper Networks®: NetScreen, ISG, NSM
f5 Networks®: Big IP
Blue Coat®: SG Appliances
© Copyright 2007. FishNet Security. All rights reserved.
Continuous Threat Management
1710 Walnut St. / KANSAS CITY, MO 64108 / toll-free: (888)732.9406
Overview
Advanced
Advanced Vulnerability and Web-App Scanning is performed by FishNet Security Information Assurance professionals in conjunction with onsite client resources. Advanced scanning requires the use of a comprehensive set of security tools that are used to test and evaluate the security posture of our client’s web applications. Advanced scans are run during pre-de�ned change (outage) windows as this intensive and intrusive service has the potential to cause service disruptions.
Managed Vulnerability and Web Application Scanning is a client-driven service, where you have full control of scanning parameters and scan scheduling through a secure, web-based portal. With our Vulnerability Scanning Service, scans can be run on-demand or scheduled to meet your needs. Scans can also be run continuously to provide constant, proactive identi�cation of vulnerabilities.
Continuous Threat Management identi�es exposures and weak spots within your network with powerful internal and external scanning technology. Using state-of-the-art technology, we are well positioned to review deployed web applications and pro-actively report on identi�ed application vulnerabilities. These �exible solutions are tailored to each customer's speci�c web facing application needs.
Services Overview:
Hosted internal and external DMZ web application scanning
Scan Preparation
Advanced Automated and Manual Scanning Service options
Changes include focused tuning and optimizing of policies
Template driven customizable reports
Customized regulatory compliance report templates
Results review meeting
Vulnerability Remediation Services
Prioritized remediation recommendations
Detailed trend reporting
Continuous Threat Management
© Copyright 2007. FishNet Security. All rights reserved.
Continuous Threat Management
Continuous Threat Management
1710 Walnut St. / KANSAS CITY, MO 64131 / toll-free: (888)732.9406
Essential
Essential Vulnerability and Web-App Scanning is performed by FishNet Security Information Assurance professionals who utilize industry proven application-scanning tools to evaluate the security posture of our client’s web application and then provide analysis and recommendations to remediate any issues identi�ed.
Managed Vulnerability and Web Application Scanning is a client-driven service, where you have full control of scanning parameters and scan scheduling through a secure, web-based portal. With our Vulnerability Scanning Service, scans can be run on-demand or scheduled to meet your needs. Scans can also be run continuously to provide constant, proactive identi�cation of vulnerabilities.
Services Overview:
Hosted internal and external DMZ web application scanning
Basic scan preparation and automated scanning
Focused tuning and optimizing of policies
Web-based reports delivered securely to any web browser
Centralized scan policy and settings management
Standardized regulatory compliance report templates
© Copyright 2007. FishNet Security. All rights reserved.
Overview
Continuous Threat Management identi�es exposures and weak spots within your network with powerful internal and external scanning technology. Using state-of-the-art, we are well positioned to review deployed web applications and pro-actively report on identi�ed application vulnerabilities. These �exible solutions are tailored to each customer's speci�c web facing application needs.