presentation

27
Log Manager and Threat Manager Company logo here

description

 

Transcript of presentation

Page 1: presentation

Log Manager and Threat Manager

Company logo here

Page 2: presentation

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

• Who We Are & What We Do• The Challenges We Address• The On-Demand Solutions• Threat Manager Overview• Log Manager Overview• Summary

Agenda

Page 3: presentation

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Who We & What We Do

• To be filled in by Partner

Page 4: presentation

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

The Challenges We Address

Page 5: presentation

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Challenges

• You are faced with increasing compliance and security requirements– Unproductive use of resources– Current solutions are expensive and/or very difficult to

use and manage– You’d like these problems to just go away

Page 6: presentation

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

The On-Demand Solution

Page 7: presentation

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

The Technology Together

1

Log Management• What it does:

• Automatically collects, reviews, and archives log data• Why it’s different and better:

• We host the solution infrastructure so you don’t have to• Managed storage provides superior security and redundancy

2

Threat Management• What it does:

• Identifies both threats and internal/external vulnerabilities• Why it’s different and better:

• Hosted expert system eliminates false positives• SOC analysts optionally provide analysis and incident response services

3

IT Compliance Management• What it does:

• Log review and archival, external scanning, incident/vulnerability reporting• Why it’s different and better:

• Addresses most challenging aspects of PCI-DSS (sections 10 and 11)

Page 8: presentation

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Network Security Options Spectrum

How We Compare

• Hardware cost

• Software cost

• Maintenance costs

• Care and feeding

• Lengthy deployment

• Labor intensive

• Requires in-house expertise

“Do it Yourself”Appliance/Software

• Rapid deployment• Zero maintenance• No software or

hardware costs• Complete control

and visibility• Superior accuracy

On-Demand Protection

Page 9: presentation

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

• Solve compliance and security challenges for mid-market with an on-demand delivery model

• Deliver differentiation and value through:– “Zero footprint solution”

• As many solution components as feasible moved “in cloud”• Reduce or eliminate burden of deployment, configuration, and

maintenance• All application capability delivered through a browser

– “Zero risk implementation”• All solution costs included in monthly fee• No hardware, software, or infrastructure investment required

The On-Demand Vision

Page 10: presentation

Threat Manager

Page 11: presentation

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Threat Manager

• Threat Manager is a real-time, on-demand network security solution that delivers integrated intrusion protection, vulnerability management, and compliance automation.

Page 12: presentation

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Security experts analyze and respond

Layered “On-Demand” (SaaS) Model

Expert system aggregates, correlates

and analyzes

Threat data collected via appliance(s) and

exported into the cloud

3

2

1

Page 13: presentation

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Threat Manager: Intrusion Protection

• Automatically protects internal networks from attacks

• Correlates network events, vulnerabilities, and global threat data

• Utilizes deep packet analysis and multi-factor detection to assess network activity

Page 14: presentation

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

7 Factor Threat Correlation

Page 15: presentation

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Threat Manager: Vulnerability Management

• Leverages over 22,000+ vulnerability checks

• On-demand internal and external scans

• Prioritization and resolution workflow management

Page 16: presentation

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Threat Manager: Compliance Automation

• PCI DSS Approved Scanning Vendor

• Compliance reporting for HIPAA, SOX, GLBA, and PCI

• Identification of vulnerabilities impacting compliance posture

Page 17: presentation

Log Manager

Page 18: presentation

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Log Manager

• Log Manager is the ONLY on-demand log management solution available - it collects, aggregates, and compresses log data locally on your network, then performs all subsequent processing, analysis, reporting and forensics.

Page 19: presentation

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Layered “On-Demand” (SaaS) Model

Hosted Log Management:

Log processing, analysis, searching and secure archival

Network Appliance:

Log collection, prioritization, compression, encryption and secure transport

Page 20: presentation

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Log Manager: Demonstrate Compliance

• Automated log data collection

• Easily review all log data on regular intervals

• Retain log data for specified time periods

Page 21: presentation

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Log Manager: Forensic Analysis

• Satisfy auditors, HR, legal, etc.

• Grid computing back-end to enable rapid log search

• Determine who did what, when they did it, and where

Page 22: presentation

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Log Manager: Monitor Performance

• Automated thresholding and alerting

• Quickly detect baseline-related anomalies

• Search quickly to identify root causes

Page 23: presentation

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Log Manager: Maintain Security Posture

• Determine the extent of security breaches

• Correlate data and identify suspicious activity

• Incident detection using log data from multiple log sources

Page 24: presentation

Summary

Page 25: presentation

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

• Easy to buy, deploy, use, and own with no software or hardware to purchase or maintain, no upfront investment required, and everything included in one convenient monthly fee

• Enables regulatory compliance by identifying both incidents and vulnerabilities that could impact compliance-relevant network assets, and by collecting, reviewing, and securely archiving log data

• Improves network security by identifying threats and vulnerabilities, and making historical log data available for analysis and forensics

Benefit Summary

Page 26: presentation

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Pricing

Page 27: presentation

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Contact Information