Uploaded on Jul 15, 2020
For any organization managed security services play an important role in enhancing the security posture, alerting against top vulnerabilities along with rapid and anywhere deployment.
Managed Security Services
Managed Security Services
An ESDS Offering
Company Overview
About ESDS
• Born with a global mind-set, ESDS began its operations from the
Tier 2 city of Nashik (India) in 2005 and presently has its footprint
in 19 nations across APAC, Europe, Middle East, the Americas and
Africa. ESDS acts as a catalyst for digital transformation in the
modern outcome-based economy by enabling organizations to
embrace advanced technologies.
• At ESDS, we believe in creating lifetime relationships and
fostering a culture of co-existence by uniting minds that are
passionate about delivering innovative solutions and exuberant
customer experience. More than 750 organizations, backed by a
committed workforce at ESDS, have successfully achieved their
business objectives.
Common Cyber Security Threats
Globally
Cyber Security in Indian Scenario-
A Snapshot
78% Companies
with no Cyber
incident response
plan
74% BFSI Sector is
a Top Target
63% attacks
amounted to
financial loss
SOC Solutions
SOC Solutions
Eagle Eye Services
SOC
Security Insight SOLUTIIONS
Services Total
Secure Services
Growing Importance of SOC
• Determines the complete security (Cyber, digital & information
security) team functionality of any business organization=on
• Responsible for assessment and implementation of the security
posture for an organization
• Deploying and managing layers of security with the aim of
protecting valuable data of an organization
• SOC-as-a-Service helps the companies to distinguish real threats
and act on these problems with higher focus and urgency
Growing Importance of SOC
(Cont.…)
• Involves components like- infrastructure, process, people, and
other devices for converting and reactive monitoring,
assessment, testing along remediation for all threats- potential as
well as actual
• Includes constant knowledge, skill and system for pulling out
potential threats from large data volumes collected & analysed
• Companies working on huge networks collect huge critical data
logs. All these require advanced SOC-as-a-Service
SOC Services
(Eagle Eye Services)
• Data aggregation
• Correlation and security monitoring
• Analytics Data
• Alerting Aggregation
• Dashboards
Correlation
• Compliance Reporting/
& Security
• Log Retention (1 Month) Compliances Monitoring
• Incident response
• Defining different reports and sending monthly reports of all SOC Eagle Eye
security incidents. Services
• Monitoring different events on 24*7 basis. Threat
Alerting &
• Threat Intelligence Intelligence / Incident
Machine
• User Behaviour & Event Analytics ResponseLearning
• Machine Learning User
• Real time Threat Hunting & detection Behaviour &
Event
• Intimating customers about security risk and incidents and Analytics
suggesting require actions.
• Studying and Reporting anomalies
SOC Services
(Security Insight Services)
Security Posture Analysis
• Understanding roles and responsibilities
Security
• System and Network architecture study Assessment
• Planning deployment techniques
Security Incident & Threat Analysis Reports & Application/
Recommend DB Testing-
• Integration with monitoring Services ation Assessment
• Devices traffic Monitoring
• SOC Security Network flow analyzer Insight Services
• Traffic analysis and reporting
• Network Flow Assessment SIEM Email &
Effectiveness Wireless
• Database Activity Assessment Modeling Assessment
• Application Performance Assessment
• Performing Vulnerability scans Gap Analysis
• Review Application system @ client IT environment
• Monitoring, logging, Reporting
SOC Services
(Total Secure Services)
• All Security Eagle Eye &
Insight services deliverables Security
Incident
• Proactive Remediation of Monitoring
Security incidents with Proactive Overall
Remediation/
Customer in Loop Security Onsite Assessments
Availability
• Onsite availability of ESDS SOC
Security expert at critical Total Secure Sevices
security issues on resolution
UBEA /Threat Database/
advisory Intelligence/ Application
ML Monitoring
• Periodic client visit of ESDS Addon
Services/
Security expert for verifying Email/
DLP/Wireless
security environment Security
eNlight WAF
Overview
• A software solution designed for protecting web applications from
threats and attacks
• Enterprises are using several public facing applications
• Detects and prevents OWASP TOP-10 Threats
eNlight WAF Modules
WAF Policy
Managemen
t
PKI WAF Ruleset
Managemen Managemen
t t
Virtual Report, Log Managemen
Patching t
Applications
Managemen
t
eNlight WAF Features & Lifecycle
1. OWASP Top-10 Defender
2. In-built Load Balancer
3. Source IP Reputation Analysis
4. Log Analysis (SIEM)
5. Learning Mode
6. Virtual Patching
7. Source IP Reputation Analysis
8. Customizable WAF Ruleset
eNlight WebVPN
Features of eNlight WebVPN
Supports Windows, MAC, Linux and mobile OS
Supports for HTML5 applications, Websocket,
RDP, FTP protocols, CGI applications
Integrate with multiple identity providers
simultaneously(AD, LDAP, Radius etc.)
Multifactor authentication with SMS and Email
OTP
Time based OTP with Google and Microsoft
Authenticator
WAF protects from OWASP Top 10 Vulnerabilities
Granular Application Access Control
Benefits of eNlight WebVPN
Anywhere Anywhere Authorization & Interoperability
Accessibility Deployment Protection
Integrate with any
Across all desktop Deployment on identity providers to
OS, Public, on-Premise or authenticate users
Browsers & Mobile hybrid cloud for ML capability for
Devices private secured anomaly detection
access
eNlight Web VPN v/s
Legacy VPN
eNlight Web VPN Legacy VPN
• Clientless WebVPN • Client or Agent Based
• More secure- giving access to only applications • Less secure- gives access to complete network
• Cost-effective solution • High Cost
• Granular access control • Fixed access control
• Don’t need to reconnect when Internet • Need to reconnect in case of Internet network
network changes changes
• Easy to deploy and use • Complex deployment and usage
• Scalable and HA • Less scalable and HA
• Includes WAF and OWASP Top-10 • WAF and other security features not available
Vulnerabilities
Concluding Remarks
Thus, for any organization managed security services play an important
role in enhancing the security posture, alerting against top
vulnerabilities along with rapid and anywhere deployment.
If you’re interested to leverage any of the mentioned managed security
services in your organization,
feel free to reach
Team ESDS through
https://esds.co.in/ [email protected] 1800 209 3006
Comments