Docstoc

Cyber Threat Management Services

Document Sample
Cyber Threat Management Services Powered By Docstoc
					             Marlabs
Cyber Threat Management Services




          © 2012 Marlabs Inc. Proprietary and Confidential
About Marlabs



  Steady Growth                                                Global Footprint

   • Founded in 1996                                             • US-centric operations with seamlessly integrated onsite and
   • 2,000+ employees                                              offshore teams

   • Consistent year-on-year revenue growth                      • Headquarters in Piscataway , NJ - USA

   • 100+ prominent blue-chip clients across a                   • Global delivery headquarters in Bangalore, India
     wide variety of verticals including                         • Office Locations: USA - Piscataway (NJ), Bethlehem (PA);
     Citibank, Barclays, T-Mobile, Toshiba,                        India - Bangalore, Mysore, Pune, Cochin, and Trivandrum;
     Toys ''R'' Us, Reliant Energy, and the                        Mexico - Mexico City; Canada – Toronto; Malaysia - Kuala
     State of New Jersey.                                          Lumpur; Latin America




  Vertical Expertise                                               Technology Solutions

   • Airline            • Energy and Utilities                     • Cloud Computing         • Microsoft
     Services           • Government                               • Mobility                • Java
   • Healthcare         • Education                                • BI-Analytics            • Open Source
   • BFSI
                        • Retail                                   • ERP
   • Media




                                          © 2012 Marlabs Inc. Proprietary and Confidential                                 2
Service Offerings




                            Application Development and Maintenance| IT Infrastructure Services | Testing | Packaged
    SERVICES                                   Implementation & Support | Product Engineering



                                                                      Energy
                               Airline                                   &                  Govt.
    BFSI       Healthcare                         Media                                             Education             Retail
                              Services                                Utilities




                                                        VERTICALS




 TECHNOLOGY SOLUTIONS       Information Security | Cloud | Mobility | BI-Analytics| Microsoft |Java | Open Source | ERP




                                         © 2012 Marlabs Inc. Proprietary and Confidential                                    3
How to Secure a Network




          Purchase Good Firewalls, Install and Configure


          Install Intrusion Detection Systems in Network and
          Monitor


          Install Intrusion Prevention Systems Device to Protect
          against Threats


          Install Anti-Virus and Malware Prevention Software


          Install Authentication Server to Protect against
          Unauthorized Entry into Networks


          Install Encryption Process to Maintain Integrity &
          Confidentiality of Data




                                © 2012 Marlabs Inc. Proprietary and Confidential   4
Recent High-Profile Cyber Attacks



   Anonymous' Hackers Take Down Justice Department Site Over Megaupload Shutdown




                                                                    Romney Private email: Authorities
   How to Protect Yourself From Hacker Attacks                          Probe Possible Hacking
                     Abroad




                         Hackers Release Private FBI Call about Hackers




                         Is the US already Engaged in a ‘Cyber War'




                                 © 2012 Marlabs Inc. Proprietary and Confidential                       5
Security Cost to Nation




                          © 2012 Marlabs Inc. Proprietary and Confidential   6
Who is Vulnerable?




     Banks and            Internet                                                       Government
                                                            Pharmaceutical
      Financial           Service                                                        and Defense
                                                             Companies
     Institutions        Providers                                                        Agencies




               Contractors                                                      Every Man,
                   to                        Multinational                       Woman &
               Government                    Corporations                       Child using
                Agencies                                                        the Internet


                             © 2012 Marlabs Inc. Proprietary and Confidential                    7
Data Protection in the Cyber World – It’s about Managing Risk – No 100% Security




          Firewalls: Can be Bypassed



          Authentication: Can be Guessed or Attacked



          IDS Device: Lots of False Positives



          Anti-Virus: Only as Good as Last Signature


          Encryption: Cracked or Can Also Be Used By Attackers



                            © 2012 Marlabs Inc. Proprietary and Confidential   8
Marlabs Cyber Threat Management Service (CTMS) Methodology



                                                     Experienced
           Leverage Holistic
                                                       Security
           Cyber Intelligence
                                                     Professionals



                                                Early Detection of
            Near-Real-Time                       Indicators and
               Analysis                             Warnings



                              Forensically
                            Sound Evidence



                       © 2012 Marlabs Inc. Proprietary and Confidential   9
Marlabs CTMS Approach




                                   Network
                                 Surveillance -
                                   NIKSUN
                 Cyber
                Security                                      Vulnerability
                Incident                                      Assessment
              Management             Cyber
                                    Security
                                  Operations
                                     Center
                                    Holistic
                 Security         Intelligence               Log Collection
              Incident Plan                                    Correlation
              Development                                     and Analysis

                                    Security
                                    Device
                                  Management




                         © 2012 Marlabs Inc. Proprietary and Confidential     10
NIKSUN Network Surveillance Appliance – Provides Visibility




                       Making the
                       Unknown
                    “Known”

                         © 2012 Marlabs Inc. Proprietary and Confidential   11
NIKSUN Network Surveillance Appliance




                               1. Everything must be recorded



                              2. Everything must be organized



                                  3. Everything must be visible



         In real time for preemptive detection, operational
           analytics, forensic analysis – all in one device



                       © 2012 Marlabs Inc. Proprietary and Confidential   12
NIKSUN Network Surveillance Appliance

                         All Incoming/Outgoing packets, flows, etc. are non-
                       intrusively analyzed and optionally recorded -- at multi
                     gigabit rates -- in real-time to generate pertinent metadata



                                                     Enterprise-wide Metadata and
                                                     analytics are immediately accessible
                                                     for visibility, analysis, alarming and
                                                     troubleshooting

                   All raw packets and metadata are correlated,
                   indexed and stored in NIKSUN’s built-in
                   Knowledge Warehouse, creating a powerful and
                   scalable real time source of network information




         The Industry’s Only Unified, Scalable and Cost-effective
                  Holistic Security Monitoring Solution

                         © 2012 Marlabs Inc. Proprietary and Confidential                     13
NIKSUN Network Surveillance Appliance



                    Core Backbone




                                                                                            Firewall
                                                                   Internal
                                                                  Network To
                                                                   Internet                            Router          Internet



                                              Gigabit Ethernet
                         Gigabit Ethernet
           Router



                                                                 Server
        End User                                                                                                                  Supply
                                                                                  Location A                                      Chain
                                                                 Router

                                                                                                            Intranet


                                                                                                                           B2B / B2B2C
                                            Connecton
    Global                                   Network                 F/W
                                                                              Router
  Correlation                                                      Location B
  Aggregation
  Management

                                                         © 2012 Marlabs Inc. Proprietary and Confidential                                  14
      Thank You




To learn more about how Marlabs can help you with
 your Cyber Security challenges, please call us at
732.694.1000 or write to us at sales@marlabs.com

           www.marlabs.com
          © 2012 Marlabs Inc. Proprietary and Confidential   15

				
DOCUMENT INFO
Shared By:
Stats:
views:35
posted:7/30/2012
language:English
pages:15
Description: Marlabs offers an overview of the kind of threats facing technology today and explains the service offerings that ensure data security at all costs.