+ All Categories
Home > Documents > AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in...

AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in...

Date post: 26-Jun-2020
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
46
AVERTING CYBER ATTACK CORPORATE OVERVIEW
Transcript
Page 1: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

AVERTINGCYBER ATTACKCORPORATE OVERVIEW

Page 2: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

Agenda

About Vanguard The Team The Threat is Real Cyber Security Solutions Services, Training and Support

Page 3: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

About Vanguard

Founded: 1986 – Trusted for over 30 years

Business: Cloud, Enterprise and z/OS Security Server – Cyber Security,

Professional Services, Education and Customer Service

Customers: Vanguard Solutions Secure any Enterprise

Markets: Financial, Insurance, HealthCare, Education, Communications,

Utilities, Transportation, Retailers and Government Agencies

Operate: Proudly developed and supported in the U.S.A. to ensure the

highest standards of quality

HQ: Las Vegas, Nevada – United States of America

The Cyber Security Experts

Page 4: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

Who is Vanguard?

Vanguard Integrity Professionals is the largest independent

provider of enterprise-wide cyber security solutions

addressing complex security and regulatory compliance

challenges.

• Since 1986, we have helped customers safeguard mission

critical data and applications.

• Vanguard is the leader in Cyber Defense.

AGILITY | SERVICE | KNOWLEDGE | INNOVATION

Page 5: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

Why Vanguard?

World’s largest Financial, Insurance, Government Agencies

and Retailers entrust their Security to Vanguard Integrity

Professionals.

• Vanguard proudly protects the nation’s critical infrastructure.

• At least five times revenue replacement is required for every

dollar of LOSS depending on margin.

• Vanguard Cyber Security Solutions can help to mitigate the

financial risk.

• Vanguard Solutions provide comprehensive Cyber Attack

Resiliency.

AGILITY | SERVICE | KNOWLEDGE | INNOVATION

Page 6: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

The Team

Page 7: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

Executive Team

• Ronn Bailey

• Brian Marshall

• Brian Caskey

• Mark VanWormer

• Jeff McNaughton

• Roxane Rosberg

• John Connors

• Yvonne Shoup

• Dan Townsend

Founder, Chief Executive and Technology Officer

President

Chief Marketing Officer

Vice President of Corporate Operations

Vice President of International

Vice President of Customer Relations and Conference

Vice President of Technology

Vice President of Administration

Inside Legal Counsel

Page 8: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

The Threat is

REAL!

Over half a

billion

personal

records were

stolen in 2015.

Over two

billion records

were stolen in

2016 alone!

Average

Cost of a data

breach in the

United States

is $7.0 million

USD.

DOD alone

experiences

41 million

scans, probes

and attacks

per MONTH.

FBI estimated

Ransomware

would become

a $1 billion

crime in 2016.

Passwords

Email

SSN

Credit Card

Bank Info

DOB

Page 9: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

Vanguard Cyber Security Solutions

Page 10: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

Vanguard Cyber Security Solutions

Vanguard Cyber Security Solutions portfolio is an integrated,

interoperable arsenal of hardened software designed to protect against

the most advanced CYBERSECURITY threats.

Vanguard defends Cloud, Enterprise and z/OS Security Server environments.

The Worlds Largest Brands are shielded by Vanguard.

Vanguard Solutions secure 4 of the top 10 Financial Institutions.

Vanguard protects 6 of the top 10 Insurance Agencies.

We safeguard the largest Government Agencies.

Vanguard Solutions lock-down the largest Retailers.

Vanguard Solutions prevent against destructive cyber attack!

Page 11: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

Vanguard Cyber Security Solutions

Vanguard Administration is a powerful cybersecurity solution that automates processes, offers powerful reporting with real-time management and provides control over policy administration saving time, resources and money.

Vanguard Audit & Compliance is a robust cybersecurity solution enabling configuration, adjustment and continuous monitor using the latest standards and data security policies to determine, isolate and ensure standards compliance.

Vanguard Authentication is a scalable, modular integrated authentication solution that enables enterprises to control and secure access to the entire IT infrastructure. Vanguard simplifies enterprise authentication and access control.

Page 12: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

CYBERSECURITY SOLUTIONS SECURING ANY ENTERPRISE

Page 13: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD ADMINISTRATION

Administrator Cleanup ez/Integrator

PasswordReset SecurityCenter Security Manager

Page 14: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD ADMINISTRATOR™

Vanguard Administrator™ saves time and money by simplifying and automating security administration tasks. Administrator enables enterprises to operate with reduced headcount and improved security, while increasing workload.

Features

• Enables security staff to automate recurring, time-consuming “task oriented” enterprise administration.

• Delivers extensive reporting and data mining.

• Provides easy to use digital certificate administration.

• Supplies easy to use UNIX files system reporting and management.

• Allows comparing profiles on the same or different databases.

• DB2 Administration

Administrator

Page 15: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD CLEANUP™

With Vanguard Cleanup™, security administrators can easily and automatically monitor z/OS Security Server access to identify and report on unreferenced security rules.

Features

• Generates commands to delete (and restore) unused and unwanted profiles.

• Produces a wide range of usage reports for auditors and security administrators.

• Provides complete accounting of all authorization requests.

• Analyzes the database to identify and report on all unreferenced or unused security entities.

Cleanup

Page 16: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD EZ/INTEGRATOR™

Vanguard ez/Integrator™ is an easy-to-use toolkit that provides Authentication, Authorization and Accounting for enterprises to extend security database to their applications.

Features

• Provides the capability to authenticate user IDs and passwords from many applications against the most secure password repository in your enterprise.

• Allows an application to use the z/OS Security Server to perform authorization checking.

• Delivers customizable, enterprise-wide, mainframe-strength, centralized accounting facilities with a simple-to-use web enabled API.

ez/Integrator

Page 17: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD PASSWORDRESET™

Vanguard PasswordReset™ saves time and money by allowing users to reset their own password..

Features

• Web-based end user self-service password reset.

• Uses standard challenge and response technology for user validation.

• Operates on various web server technologies.

• All web-based transactions are fully secure and encrypted.

• Integrates with Vanguard Tokenless Technologies to deliver token passcodes.

PasswordReset

Page 18: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD SECURITYCENTER™

Security Center

Vanguard SecurityCenter™ is a Windows GUI interface to provide point and click security administration for both z/OS Security Server and DB2 environments.

Features

• Provides real-time administration functionality for z/OS Security Server and DB2, with point-and-click, across windows compatible desktop and mobile devices.

• Enables automated recurring, time-consuming “task oriented” administration.

• Allows comparing profiles on the same or different databases.

• Automatically generates the correct commands to accompany each action.

Page 19: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD SECURITY MANAGER™

Security Manager

Vanguard Security Manager™ is an easy to use solution for non-technical personnel to administer and report on all z/OS Security Server and z/VM systems across the enterprise with a simple to use web-based interface.

Features

• Enables security administrators to automate recurring, time-consuming, “task-oriented” administration.

• Delivers extensive reporting and data mining.

• Allows comparing profiles on the same or different databases.

• Vanguard Security Manager™ includes comprehensive analytics and reporting capabilities to help security teams rapidly identify problems and allow auditors to quickly view changes and report findings.

• Pre-built Vanguard Best Practice reports that analyze databases for potential security threats that can be run on an ad hoc or ongoing basis.

Page 20: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD AUDIT & COMPLIANCE

Advisor Analyzer Configuration Manager Enforcer

ez/Integrator InCompliance Offline Policy Manager

Page 21: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD ADVISOR™

Vanguard Advisor™ provides complete collection and reporting of system events to enable powerful forensic analysis.

Features

• Provides powerful system event reporting and data mining capabilities.

• Advisor’s active alerts provides immediate notification of security events or combinations of events.

• Automates removal of operations attributes.

• Automates remediation of warning on profiles.

• Advisor has the ability to reconstruct any or all z/OS Security Server commands issued on the system.

Advisor

Page 22: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD ANALYZER™

Vanguard Analyzer™ provides Vanguard expertise on z/OS Security Server. Analyzer delivers expert-level vulnerability assessments of z/OS Security Server configuration controls and security settings with the ability to produce audit results in minutes.

Features

• Analyzer runs thousands of integrity checks for z/OS Security Server.

• Smart link provides integration with other Vanguard software products.

• Smart assist describes discovered issues and remediation in plain language.

• Provides file change detection for sensitive corporate data.

• Delivers “Find-it-Fix-it-Fast” functionality providing direct remediation from a finding.

Analyzer

Page 23: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD CONFIGURATION MANAGER™

Vanguard Configuration Manager™ automates review of current z/OS Security Server configurations against prevailing standards to include DISA STIG, NIST and DB2 hardening standards and Vanguard Best Practices dramatically reducing personnel cost and time to verify compliance.

Features

• Configuration Manager™ is designed to provide the fastest, most cost-effective and accurate method to verify that security configuration controls are in accordance with published prevailing standards.

• Configuration Manager™ allows organizations to easily move to continuous monitoring from periodic compliance reporting.

• Organizations can perform tests and report findings in a few hours instead of the hundreds or thousands of hours required when using published standards.

• Creates summary and detailed reports to provide the proper documentation required.

Configuration Manager

Page 24: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD ENFORCER™

Vanguard Enforcer™ provides continuous monitoring of security controls with an automated process to compare your current z/OS Security Server configuration controls against the previously established baseline.

Features

• Detects and corrects changes to the system that would violate security policies.

• Enforcer’s active alerts provides immediate notification of security events or combinations of events.

• Captures and baselines current security configurations and profiles for future comparison.

• Monitors system critical resources including the most privileged data sets and programs.

Enforcer

Page 25: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD EZ/INTEGRATOR™

Vanguard ez/Integrator™ is an easy-to-use toolkit that provides Authentication, Authorization and Accounting for enterprises to extend security database to their applications.

Features

• Provides the capability to authenticate user IDs and passwords from many applications against the most secure password repository in your enterprise.

• Allows an application to use the z/OS Security Server to perform authorization checking.

• Delivers customizable, enterprise-wide, mainframe-strength, centralized accounting facilities with a simple-to-use web enabled API.

ez/Integrator

Page 26: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD INCOMPLIANCE™

Vanguard InCompliance™ performs millions of critical compliance checks to guarantee adherence to Vanguard and industry best practices, without increasing processing overhead.

Features

• Findings are reported immediately at a summary level to satisfy management requirements. InCompliance can also provide detail at the item-by-item level to understand and remediate each finding rapidly.

• Baseline checks can be marked with zero tolerance thereby immediately failing the complete compliance check upon any single deviation.

• Delivers historical trending in graphical format.

• Perform SOX, HIPAA, GLBA, PCI DSS, FISMA and other regulatory compliance audits rapidly to prevent negative internal and external findings.

InCompliance

Page 27: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD OFFLINE™

Vanguard Offline™ is a simulation-testing application that allows security administrators to test and evaluate the impact of new commands before being implemented in a production environment.

Features

• Security administrators can execute commands against a copy of their database as if against a production system and analyze the potential impact of the new commands and all consequences thereof.

• Collects and aggregates all security decisions into a database.

• Produces a wide range of usage reports for auditors and security administrators.

• Provides complete accounting of all authorization requests.

• Provides a simple method for remediation of elevated access and authorities.

Offline

Page 28: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD POLICY MANAGER™

Vanguard Policy Manager™ dramatically reduces security risks and improves regulatory compliance, minimizing the need for expensive remediation, while increasing staff productivity.

Features

• Ensures all commands comply with company policies.

• Where possible, modifies commands to be compliant.

• Provides an audit trail within the profile of the command history.

• Provides pre-defined best practice policies.

• Delivers the ability to create and customize user defined policies.

• Provides proactive enforcement, corrects commands in accordance with policies, while controlling security administrators.

• Provides real-time audit trail of all commands for authorized users to view.

Policy Manager

Page 29: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD AUTHENTICATION

Authenticator ez/Integrator ez/PIV Card

ez/SignOn ez/Token Tokenless

Page 30: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD AUTHENTICATOR™

Vanguard Authenticator™ is a protocol converter and LDAP directory. This middleware allows for simplification and centralization of security authentication services.

Features

• Simplifies administration of security for a diverse set of devices and protocols.

• Reduces the complexity by reducing the number of passwords required.

• Centralizes authentication requests from many applications, devices and operating systems.

• Provides conversion of multiple authentication protocols.

• Processes all incoming authentication requests and performs authentication.

• Performs as a LDAP virtual directory.

Authenticator

Page 31: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD EZ/INTEGRATOR™

Vanguard ez/Integrator™ is an easy-to-use toolkit that provides Authentication, Authorization and Accounting for enterprises to extend security database to their applications.

Features

• Provides the capability to authenticate user IDs and passwords from many applications against the most secure password repository in your enterprise.

• Allows an application to use the z/OS Security Server to perform authorization checking.

• Delivers customizable, enterprise-wide, mainframe-strength, centralized accounting facilities with a simple-to-use web enabled API.

ez/Integrator

Page 32: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD EZ/PIV CARD™

Vanguard ez/PIV Card™ satisfies FIPS 201, HSPD-12. It allows your users to authenticate to z/OS Security Server through the use of a government PIV or CAC Card.

Features

• ez/PIV Card™ is a PIV Card authentication solution that ensures z/OS Security Server complies with Homeland Security Presidential Directive 12 (HSPD-12) and Federal Information Processing Standards 201 (FIPS 201).

• ez/PIV Card increases system security by requiring multi-factor authentication to validate employees and external contractors before they gain access to an enterprise’s most critical resources.

• Provides out-of-band password generation and validation.

• Provides enhanced PIV Card and Password validation.

• Once a PIV Card has been revoked, a user is immediately denied access to z/OS Security Server.

ez/PIV Card

Page 33: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD EZ/SIGNON™

Vanguard ez/SignOn™ is a single password solution for multi-platform environments. It provides sign-on controls, password synchronization and centralized user authentication on z/OS Security Server, Windows, Linux and iSeries.

Features

• Allows for a single point of administration for password change and revocation of users across the enterprise.

• Enables users to sign on to different systems utilizing a single password solution.

• When users change their password on any one system, ez/SignOn™ will update other systems in the enterprise to keep their password synchronized.

• Automates password authentication, and authenticates users from nearly any system or hardware device – the same password is used to safely sign on to multiple systems in the enterprise.

ez/SignOn

Page 34: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD EZ/TOKEN™

Vanguard ez/Token™ is a multi-factor authentication solution that allows users to authenticate through common token technologies including but not limited to RSA SecurID, YUBiKEY, OAUTH tokens, SafeSign or ActivIdentity tokens to the z/OS Security Server or any other application currently using RACF authentication.

Features

• Validates user logon to the Mainframe using external authentication authorities.

• Supports multiple token technologies from well known token providers such as Ping, DUO, RSA, SafeSign, OAUTH and YUBiKEY.

• Provides selective inclusion or exclusion of multifactor authentication at both an application and user level.

• Allows for easy user ID to distributed identity mapping, providing the ability for a one-to-one or one-to-many relationship to exist.

ez/TOKEN

Page 35: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD TOKENLESS AUTHENTICATION™

Vanguard Tokenless Authentication™ delivers strong authentication capabilities by generating and sending a one-time use, time sensitive passcode to a mobile communication device the user already possesses.

Features

• Provides a cost effective alternative to tokens, can deliver a time sensitive passcode to a mobile device or tablet.

• Provides selective inclusion or exclusion of multifactor authentication at both an application and user level.

• Integration with other Vanguard Authentication solutions extends Tokenless Authentication across the enterprise.

• A complete, economical, multifactor authentication solution that generates and sends a one-time use, time-sensitive passcode to a mobile communication device the user already possesses.

Tokenless Authentication

Page 36: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

Continuous Monitoring

Page 37: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD CONTINUOUS MONITORING

Continuous Monitoring

Cyber threats have become more prevalent and are increasing risks to all enterprises and federal information systems today.

• As a result, there is a need for better, more actionable intelligence about the security status of systems. Continuous monitoring of information systems security provides organizations with near real-time information about security breaches and changes in security controls to enable them to reduce risk exposure and vulnerabilities.

The Next Line of Defense – Vanguard Continuous Monitoring• Requirements for continuous monitoring of federal information systems

deliver a higher level of cybersecurity protection and address the growing threatscape facing federal government agencies. The need for continuous monitoring requires organizations to implement new processes and automated tools to assist them. NIST regards automation tools as important for the success of continuous monitoring.

Page 38: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

Services

Page 39: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD SERVICES

The most effective way for organizations to reduce the cost of maintaining enterprise security and improve security postures is to automate and optimize information security. Vanguard Professional Services offers many security services to enable security automation and optimization.

Vanguard Professional Services include penetration testing, security assessments and remediation.

Page 40: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD SERVICES (cont.)

Implementation Services• Include increasing efficiency of existing security and compliance

capabilities, deploying new security proficiencies, supporting industry and regulatory requirements, and training.

Remediation Services• Vanguard has the largest and most experienced group of security

specialists in the world and proven expertise remediating enterprise systems.

Security Assessments• Quickly identify and prioritize penetration risks, determine

best practices for security and integrity and evaluate the potential impact and exposure of any findings.

Staff Augmentation• Enable organizations to quickly add qualified staff to their

enterprise security team.

Page 41: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD SERVICES (cont.)

Migrations• Organizations are turning to the Vanguard Professional Services team to

assist them with DB2-to-RACF security migrations.

Penetration Testing• Vanguard Penetration Testing services discover high-risk vulnerabilities,

determines if sufficient defenses are in place, offers remediation guidance, and recommends a plan and methodology for ongoing testing.

Role-based Access Control• Role-Based Access Control software, developed by Vanguard is used to

help organizations reduce provisioning time, eliminate errors and adhere to role structure over time.

The Team• The Professional Services team are renowned worldwide for

their expertise as cyber security experts. Team members have on average 30 years enterprise security experience.

Page 42: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

Training

Page 43: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD zSECURITY UNIVERSITY

Vanguard zSecurity University™ is a year-round training program providing comprehensive IT security education for any enterprise security staff and IT security professionals. For nearly 30 years, Vanguard has trained thousands of IT security professionals worldwide. Vanguard zSecurity University is the industry’s leading source to obtain enterprise, cloud Security Server-specific IT security training.

Training

Page 44: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

VANGUARD zSECURITY UNIVERSITY (cont.)

Vanguard Classroom Training• Experience actual classroom setting while attending the industry

leading VSC Conference or experience training at your location with actual hands-on, instructor provided training and certification.

Online Training• Many organizations don’t have the time or budget to send security

team members to days of expensive training. Yet team members often lack basic skills they need to do their jobs accurately and effectively. On-Demand sessions provide subscribers with everything they need to perform security administration.

Webinars• Webinars provide yet another opportunity to stay current on

the latest standards and technologies with comprehensive instructor led webinars.

Training

Page 45: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

Vanguard Integrity Professionals is the largest

independent provider of enterprise security

software addressing complex security and

regulatory compliance challenges.

The World’s largest Financial, Insurance,

Government Agencies and Retailers entrust their

Security to Vanguard Integrity Professionals.

Page 46: AVERTING CYBER ATTACK · The Threat is REAL! Over half a billion personal records were stolen in 2015. Over two billion records were stolen in 2016 alone! Average Cost of a data breach

www.go2vanguard.com

Thank you!

+1.702.794.0014


Recommended