ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION STRATEGY.

13
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY

description

FROM MANUFACTURING TO BUSINESS/CONSUMER DATA APPLICATIO NS NETWORK INFORMATIO N THE ARAMA TECH 6 PILLARS APPROACH… TRAINING ACADEMY IMPLEMENTATIO N SERVICES MANAGED SERVICES PURCHASE SERVICES HPE Atalla / Voltage HPE ArcSight TippingPoint HPE Fortify DATA PROTECTION ARAMA TECH TRAINING ACADEMY USER SECURITY CLOUD SECURITY SECURITY INTELLIGENCE NETWORK SECURITY APPLICATION SECURITY DATA SECURITY

Transcript of ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION STRATEGY.

Page 1: ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION  STRATEGY.

ARAMA TECHD A T A P R O T E C T I O N P R O F E S S I O N A L S

VISION&

STRATEGY

Page 2: ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION  STRATEGY.

APPLICATIONS

FROM MANUFACTURING TO BUSINESS/CONSUMER

DATA

NETWORK INFORMATION

THE ARAMA TECH 6 PILLARS APPROACH…

TRAINING ACADEMYIMPLEMENTATION SERVICES MANAGED SERVICESPURCHASE

SERVICES

USER SECURITY

CLOUD SECURITY

SECURITY INTELLIGENCENETWORK SECURITYAPPLICATION

SECURITYDATA SECURITYSECURITY

INTELLIGENCENETWORK SECURITYAPPLICATION SECURITYDATA SECURITY

Threat Protection

ENDPOINTS DATA CENTER

GATEWAYS

• Advanced Threat Protection Across All Control Points• Built-In Forensics and Remediation Within Each Control

Point• Integrated Protection of Server Workloads: On-Premise,

Virtual, & Cloud• Cloud-based Management for Endpoints, Datacenter, and

Gateways

Information ProtectionDATA IDENTITI

ES

• Integrated Data and Identity Protection

• Cloud Security Broker for Cloud & Mobile Apps

• User and Behavioral Analytics• Cloud-based Encryption and Key

Management

Cyber Security ServicesMonitoring, Incident Response, Simulation, Adversary Threat Intelligence

ON PREMISE

MANAGED SERVICES

Page 3: ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION  STRATEGY.

FROM MANUFACTURING TO BUSINESS/CONSUMER

DATA APPLICATIONS

NETWORK INFORMATION

THE ARAMA TECH 6 PILLARS APPROACH…

TRAINING ACADEMYIMPLEMENTATION SERVICES MANAGED SERVICESPURCHASE

SERVICES

HPE Atalla / Voltage

HPE ArcSightTippingPointHPE Fortify

ARAMA TECH TRAINING ACADEMY

SECURITY INTELLIGENCENETWORK SECURITYAPPLICATION

SECURITYDATA SECURITY

Page 4: ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION  STRATEGY.

AP DATA

TIPPINGPOINT

ARAMA TECH PARTNERSHIPS & SOLUTIONS

ANALYTICS PLATFORM

SSL VISIBILITY

ON PREMISE

HP ARCSIGHT

HP VOLTAGE / ATALLA

HP FORTIFY

TRAINING ACADEMYIMPLEMENTATION SERVICES MANAGED SERVICESPURCHASE

SERVICES

DLP + IAM

EMAIL SECURITY

ADVANCED THREAT PROTECTION

WEB SECURITY

SYMANTEC ENDPOINT

PROTECTION

DATA CENTER SECURITY

DEEPSIGHT

FILE SHARING

Page 5: ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION  STRATEGY.

PROACTIVE PROTECTION

THE BEST WAY TO

PREDICT THE FUTURE

IS TO

CREATE IT!

Page 6: ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION  STRATEGY.

DECISION DRIVERS FOR SECURITY MEASURES

Compliance Cyber Threats

Budget Too late

STRATEGIC OPERATIONAL

FINANCIAL BREACHED

RISK BASEDIMPACT ON ORGANIZATION

THREATS & VULNERABILITIESCONTROL MEASURES DECISION

Today….

X

Page 7: ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION  STRATEGY.

Capturing threat intelligence over:

SYMANTEC THREAT INTELLIGENCE

GLOBAL INTELLIGENCE NETWORK

GIN

DEEPSIGHTTHREAT INTELLIGENCE

Page 8: ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION  STRATEGY.

TREND 1 – MULTI VECTOR USER CENTRIC ATTACKS

“Cyber criminals only target big companies. I am not at risk here”

PROTECT YOUR ENDPOINTS, NETWORK AND EMAIL!

Cyber criminals are focusing on users, with email as their preferred media!

THINK AGAIN!!!

“Cyber criminals are attacking the network firewalls first”

https://www.symantec.com/advanced-threat-protection/Advanced Threat Protection

DETECT, RESPOND, RECOVER

Gold Partner

Page 9: ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION  STRATEGY.

TREND 2 – CLOUD BASED PROTECTION

Fast

Secure

Flexible

100% Availability

ENDPOINT NETWORK EMAIL DATA

Symantec Unified Endpoint Protection

Cost saving

Border Defence

SYNAPSECORRELATION

Endpoint Protection

Email Security

Web Security

Enterprise Vault

ARAMA TECH Deployment Models

Future

Data Center

Security

Stopping threats BEFORE they enter

your network

ISO27001/SSAE16 certified DC’s

16 DC’s redundancy

No hardware neededNo project neededNo maintenance needed

Pay per month for actual usage

Service available in minutes/hours rather then in days/weeks

ATP Endpoint ATP EmailATP Network

CLOUD SECURITY BROKERDLP-ENCRYPTION-MAM

ON PREMISE

MANAGED SERVICES

DEEPSIGHT

CYBER INTELLIGENCE

GIN

Gold Partner

Page 10: ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION  STRATEGY.

TREND 3 – MANAGED SERVICES

MONITORINGINCIDENT RESPONSE

INTELLIGENCE

PROVISIONING REPORTING

MANAGED SERVICES

Threat Protection

ENDPOINTS DATA CENTER

GATEWAYS

Information ProtectionDATA IDENTITI

ES

Page 11: ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION  STRATEGY.

DLP ENCRYPTION

MAM

INFORMATION

Data Loss

Prevention

Identity: Access

Manager

VOLTAGE- SECUREDATA- SECUREMAIL

APPLICATION

Web Application

Firewall

FORTIFYSoftware Security Assurance

PROTECTING YOUR BUSINESS – RISK BASED PRIORITIES

Endpoint Protection

Email Security Web Security

Enterprise VaultEmail Encryption

Data ProtectionImage Control

DEEPSIGHT

CYBER INTELLIGENCE

Antivirus URL FilteringAdvanced

Threat Protection

Network IPS

Cloud Sandboxing

ATP Endpoint ATP EmailATP Network

ADVANCED THREAT PROTECTION

SYMANTEC ENDPOINT SUITE SYMANTEC EMAIL SUITE

ENDPOINT NETWORK EMAIL

AntivirusURL

Filtering

Host IPSAdvanced Threat Protectio

n

Host Firewall

SPAM filtering

Anti phishin

g

DATA CENTER SECURITY

Email Encryp

t

Correlation

SYNAPSE

NextGenFirewall

GIN

TIPPINGPOINTNextGen IPS

USER BEHAVIOR ANALYTICS

ANALYTICS PLATFORM

- SIEM- CENTRAL LOG MANAGEMENT

ARCSIGHT

BOXContent and File Sharing

Page 12: ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION  STRATEGY.

BUSINESS MODEL

TECHNOLOGY SALES CONSULTANCYMANAGED SERVICES

PROJECTS

STRATEGY &

PROCESS

BUSINESS IMPLEMENTATIO

N

TRAINING ACADEMY SUPPORT

AD-HOCASSIGNMENTS

SOURCING

PROFESSIONAL SERVICES

Page 13: ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION  STRATEGY.

www.aramatech.com

ARAMA TECH  DATA PROTECTION PROFESSIONALS

Wildenborchlaan 13 Ejbydalsvej 1353207 ZA Spijkenisse 2600 GlostrupThe Netherlands Denmark

+31 10 340 1964 [email protected] www.aramatech.com