CNAM-PRODUCT DATASHEET

3
PRODUCT BROCHURE CNAM SECURITY SUITE REALTIME VISIBILITY INTO YOUR ENTERPRISE PERIMETER Managed attack detection service customized for your network and applications on a pay-per-use model Building a brand is an ongoing exercise, its a process in which most organizations invest a considerable amount of time and resources. Strategies for brand building are well thought out and execution is monitored on a day to day basis. In this phase of growth some organizations have had to suffer a major setback due to a compromise in their computing infrastructure. Businesses have suffered heavy losses due to exposures that were completely avoidable. In this view, the question an enterprise boss needs to ask is In these times enterprises are constantly challenged and are required to focus on areas of online security that need technology, skill and constant research in order to make the cut. Organizations across the world, sometime belatedly, have realized that their preparedness to respond to cyber-attacks is inadequate. Their brand value has been severely affected through well publicized security breaches. They have had to spend millions in recovering from such attacks in addition to paying fines for loss of data. CNAM: A DIFFERENT APPROACH TO SECURITY NetMonastery has spent the last decade perfecting the science of stopping attackers in their tracks. With CNAM, it has been helping organizations to protect their vital online assets enabling them to concentrate on their business without fear of disruption. It is an automated and integrated solution that has been architected to focus on the most important requirement of online security. Identifying and stopping attackers! THE MANAGEMENT ADVANTAGE A real-time attack detection engine that efficiently identifies attackers using a detection engine, a correlation engine, manual application integration and third party intelligence. Unlike other systems CNAM controls all detection layers from end to end and is therefore able to deliver accurate results in time. Some of the key benefits of using CNAM are: Sale of deliverables - CNAM is delivered as a service and therefore customers only receive notifications when attacks are identified. Everything else is managed by the technology and the support staff in the background. NetMonastery believes in its ability to simply complex issues. Seamless scaling - the CNAM service covers intense networks and geographies without exponential increase in cost incurred in cross connectivity or additional software / hardware licenses. Customers can now scale their network without having to worry about security. Customization - CNAM ties in all the loose ends from the security presepective. The service drastically increases the security coverage by customizing the solution to the infrastructure and the application being protected. Customization is also applied to the correlation models based on intelligence threads being processed by CNAM. No capital investment - This solution is delivered in the Software-as-a-Service (SaaS) model and therefore a customer is only expected to pay based on the usage. Security assurance - NetMonastery follows a measured approach to security, it has invested in building processes that can be used to measure the detection coverage of networks. Due to this capability, CNAM is able to provide a detection coverage task at all times. NetMonastery provides assurance to its customers on this basis. are we paying enough attention to brand protection as against the effort spent on building it? netmonastery.com

Transcript of CNAM-PRODUCT DATASHEET

Page 1: CNAM-PRODUCT DATASHEET

PRODUCT BROCHURECNAM SECURITY SUITE

REALTIME VISIBILITY INTO YOURENTERPRISE PERIMETERManaged attack detection service customized foryour network and applications on a pay-per-use model

Building a brand is an ongoing exercise, its a process in which most organizations invest a considerable amount of time and resources. Strategies for brand building are well thought out and execution is monitored on a day to day basis. In this phase of growth some organizations have had to suffer a major setback due to a compromise in their computing infrastructure. Businesses have suffered heavy losses due to exposures that were completely avoidable. In this view, the question an enterprise boss needs to ask is

In these times enterprises are constantly challenged and are required to focus on areas of online security that need technology, skill and constant research in order to make the cut. Organizations across the world, sometime belatedly, have realized that their preparedness to respond to cyber-attacks is inadequate. Their brand value has been severely affected through well publicized security breaches. They have had to spend millions in recovering from such attacks in addition to paying fines for loss of data.

CNAM: A DIFFERENT APPROACH TO SECURITYNetMonastery has spent the last decade perfecting the science of stopping attackers in their tracks. With CNAM, it has been helping organizations to protect their vital online assets enabling them to concentrate on their business without fear of disruption.

It is an automated and integrated solution that has been architected to focus on the most important requirement of online security. Identifying and stopping attackers!

THE MANAGEMENT ADVANTAGEA real-time attack detection engine that efficiently identifies attackers using a detection engine, a correlation engine, manual application integration and third party intelligence. Unlike other systems CNAM controls all detection layers from end to end and is therefore able to deliver accurate results in time. Some of the key benefits of using CNAM are:

Sale of deliverables - CNAM is delivered as a service and therefore customers only receive notifications when attacks are identified. Everything else is managed by the technology and the support staff in the background. NetMonastery believes in its ability to simply complex issues.Seamless scaling - the CNAM service covers intense networks and geographies without exponential increase in cost incurred in cross connectivity or additional software / hardware licenses. Customers can now scale their network without having to worry about security.Customization - CNAM ties in all the loose ends from the security presepective. The service drastically increases the security coverage by customizing the solution to the infrastructure and the application being protected. Customization is also applied to the correlation models based on intelligence threads being processed by CNAM.

No capital investment - This solution is delivered in the Software-as-a-Service (SaaS) model and therefore a customer is only expected to pay based on the usage.

Security assurance - NetMonastery follows a measured approach to security, it has invested in building processes that can be used to measure the detection coverage of networks. Due to this capability, CNAM is able to provide a detection coverage task at all times. NetMonastery provides assurance to its customers on this basis.

are we paying enough attention to brand protection as against the effort spent on building it?

netmonastery.com

Page 2: CNAM-PRODUCT DATASHEET

PRODUCT BROCHURE - CNAM SECURITY SUITE

THREATCORRELATION

INTRUSIONDETECTION

APPLICATIONINTEGRATION

CNAM

COLLABORATIVEINTELLIGENCE

CNAM: STRATEGIC COMPONENTS FOR ATTACK DETECTION

netmonastery.com

THE TECHNICAL ADVANTAGEYears of continuous research on attack detection techniques has lead us to build one of the most elaborate attack detection infrastructures in the world. Some of the key technical benefits of using CNAM are:

Accuracy and speed - At NetMonastery we have tried several hundred techniques to detect attacks, and the only two parameters that determine the success or failure of a technique are accuracy and speed of detection. We are constantly trying to employ methods that helps us increase our accuracy of detection and at the same time reduce the time taken to identify an attack. The CNAM support center is constantly monitoring the Maximum Allowable Work Cycle (MAWC) for each client to ensure we are delivering our results within a reasonable time window.

Local events store - all events produced by the enter-prise infrastructure are stored locally within the enterprise perimeter, this allows organizations to comply to the most stringent security guidelines. CNAM and it’s distributed intelligence processing centers allows event correlation to be completed within the enterprise. These distributed intelligence processing centers are capable of processing more than a million threads of intelligence data at any given time.

Reduced management effort - CNAM tremendously reduces the efforts spent by a client in monitoring the security infrastructure. The entire security infrastructure is tied down to the CNAM service and is monitored centrally. Event delivery failures are identified by the stack by setting of log thresholds, and automated alerts are raised to notify the client on failures. Process or system failures on the CNAM components are quickly detected in advance by the system telemetry stack.

ADVANCED SECURITY PROCESSEnterprise networks are continuously required to be on the cutting edge of security in order to successfully detect and contain attacks. Being aware and maintaining a secure operating environment is extremely difficult, considering the shortage of skilled resources for this herculean task. CNAM drastically reduces the pressures of attack detection on the security staff by providing the requisite technologies, intelligence and management. For its premium client CNAM also binds the application infrastructure with the security systems to provide a much larger coverage into attacks.

SaaS BASED LICENSINGNetMonastery adopts a simple pay-per-use policy for CNAM, clients only pay for the amount of bandwidth that is processed by the system. All technologies and support is delivered on a monthly fee that is based on the usage of the client itself. There are no upfront investments required which makes the service easy to adopt and validate. The licensing scheme is incremental and scales with the clients usage, transferring the benefits of over usage to the client without having to constantly monitor and upgrade usage slabs.

APPLICATION SECURITY INTEGRATIONThe software industry has matured and so has the quality of off the shelf software, over the years the number of vulnerabilities in these systems have reduced. However attacks have now become more sophisticated and are increasingly getting targeted on custom developed enterprise software. More than eighty five percent of the attacks are now focussed on end user applications. Building systems to detect custom attacks on custom applications has lead NM to the development of high quality integration techniques that help enterprises connect applications to their existing security infrastruc-ture. The CNAM premium service provides:

• Study of the exposed application and gap analysis on the existing attack detection capability

• Developing a security integration strategy and roadmap, further implementing the same with active involvement and support from the client

• Integrating the application data into CNAM, setting up threat models and coverage maps

• Developing application intelligence models and implementing them on the UNET

• Reviewing threat models and sensitivity on a continu-ous basis and also update the strategy as a part of the system change management process

Page 3: CNAM-PRODUCT DATASHEET

PRODUCT BROCHURE - CNAM SECURITY SUITE

NetMonastery NSPL - Support: +91 22 40111911 Tel: +91 22 25785759 Email: [email protected]

© Copyright 2012 NetMonastery NSPL, INDIA. All rights reserved. The NetMonastery logo and CNAM are trademarks of NetMonastery NSPL.All third party trademarks mentioned in this document or website are the property of their respective owners.