Date post: | 07-Dec-2014 |
Category: |
Technology |
Upload: | rinky25 |
View: | 328 times |
Download: | 0 times |
Log Manager and Threat Manager
Company logo here
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
• Who We Are & What We Do• The Challenges We Address• The On-Demand Solutions• Threat Manager Overview• Log Manager Overview• Summary
Agenda
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Who We & What We Do
• To be filled in by Partner
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
The Challenges We Address
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Challenges
• You are faced with increasing compliance and security requirements– Unproductive use of resources– Current solutions are expensive and/or very difficult to
use and manage– You’d like these problems to just go away
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
The On-Demand Solution
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
The Technology Together
1
Log Management• What it does:
• Automatically collects, reviews, and archives log data• Why it’s different and better:
• We host the solution infrastructure so you don’t have to• Managed storage provides superior security and redundancy
2
Threat Management• What it does:
• Identifies both threats and internal/external vulnerabilities• Why it’s different and better:
• Hosted expert system eliminates false positives• SOC analysts optionally provide analysis and incident response services
3
IT Compliance Management• What it does:
• Log review and archival, external scanning, incident/vulnerability reporting• Why it’s different and better:
• Addresses most challenging aspects of PCI-DSS (sections 10 and 11)
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Network Security Options Spectrum
How We Compare
• Hardware cost
• Software cost
• Maintenance costs
• Care and feeding
• Lengthy deployment
• Labor intensive
• Requires in-house expertise
“Do it Yourself”Appliance/Software
• Rapid deployment• Zero maintenance• No software or
hardware costs• Complete control
and visibility• Superior accuracy
On-Demand Protection
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
• Solve compliance and security challenges for mid-market with an on-demand delivery model
• Deliver differentiation and value through:– “Zero footprint solution”
• As many solution components as feasible moved “in cloud”• Reduce or eliminate burden of deployment, configuration, and
maintenance• All application capability delivered through a browser
– “Zero risk implementation”• All solution costs included in monthly fee• No hardware, software, or infrastructure investment required
The On-Demand Vision
Threat Manager
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Threat Manager
• Threat Manager is a real-time, on-demand network security solution that delivers integrated intrusion protection, vulnerability management, and compliance automation.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Security experts analyze and respond
Layered “On-Demand” (SaaS) Model
Expert system aggregates, correlates
and analyzes
Threat data collected via appliance(s) and
exported into the cloud
3
2
1
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Threat Manager: Intrusion Protection
• Automatically protects internal networks from attacks
• Correlates network events, vulnerabilities, and global threat data
• Utilizes deep packet analysis and multi-factor detection to assess network activity
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
7 Factor Threat Correlation
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Threat Manager: Vulnerability Management
• Leverages over 22,000+ vulnerability checks
• On-demand internal and external scans
• Prioritization and resolution workflow management
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Threat Manager: Compliance Automation
• PCI DSS Approved Scanning Vendor
• Compliance reporting for HIPAA, SOX, GLBA, and PCI
• Identification of vulnerabilities impacting compliance posture
Log Manager
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Log Manager
• Log Manager is the ONLY on-demand log management solution available - it collects, aggregates, and compresses log data locally on your network, then performs all subsequent processing, analysis, reporting and forensics.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Layered “On-Demand” (SaaS) Model
Hosted Log Management:
Log processing, analysis, searching and secure archival
Network Appliance:
Log collection, prioritization, compression, encryption and secure transport
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Log Manager: Demonstrate Compliance
• Automated log data collection
• Easily review all log data on regular intervals
• Retain log data for specified time periods
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Log Manager: Forensic Analysis
• Satisfy auditors, HR, legal, etc.
• Grid computing back-end to enable rapid log search
• Determine who did what, when they did it, and where
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Log Manager: Monitor Performance
• Automated thresholding and alerting
• Quickly detect baseline-related anomalies
• Search quickly to identify root causes
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Log Manager: Maintain Security Posture
• Determine the extent of security breaches
• Correlate data and identify suspicious activity
• Incident detection using log data from multiple log sources
Summary
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
• Easy to buy, deploy, use, and own with no software or hardware to purchase or maintain, no upfront investment required, and everything included in one convenient monthly fee
• Enables regulatory compliance by identifying both incidents and vulnerabilities that could impact compliance-relevant network assets, and by collecting, reviewing, and securely archiving log data
• Improves network security by identifying threats and vulnerabilities, and making historical log data available for analysis and forensics
Benefit Summary
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Pricing
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Contact Information