SlideShare uma empresa Scribd logo
1 de 8
There is always an uncompromising
                                                                                  element in every Business
                        Integrated Operations
                        Management Services
   Green Datacenter                                Managed Mainframe
       Services                                         Services



     End User                                             Cross Functional
     Computing                                                Services




Network Services                                       Security Services




                                                                             We call it We call it

                                                                                 SECURITY
Industrialized IT Management                                                 Secured Systems | Compliant Processes
  Optimized | Flexible | Centralized & Standardized | Business Aligned




                             www.hclisd.com                                                www.hclisd.com
Why Outsource Security                                                                                                                 Managed Security
Services
As enterprises grow, so does the requirement for global information exchange amongst employees, suppliers, partners and
                                                                                                                                       Services
customers. However, as this information becomes more broadly distributed, threats to the confidentiality, integrity and availability
of this information increase exponentially. The utmost negative impact of advancement of technology is an exponential increase in
security threats such as Cyber threats, Malware infections, Phishing attacks, Web Application Attacks etc. All these security
breaches may result in drastic revenue loss, legal liabilities, diminished productivity and brand erosion. It becomes imperative for
Enterprises to look out for those partners, who can work with them to build up business aligned information security framework
and improve the ROSI (Return on Security Investment). Service providers with end to end capability are becoming default choice         HCL's Managed Security Services from four fully operational Security Operation centers (SOC) offer real-time protection to the
for Enterprises.                                                                                                                       organizations, thereby reducing their risks in today's ever-changing security threat environment. Balanced approach, maintaining
                                                                                                                                       compliance, proactive security stance, technophobic to techno centric focus and flexible delivery model is what HCL managed security




    {                                                                                                                    {
                                                                                                                                       services offers to its customers across the globe. The service offering are bundled in a manner so as to take care of the entire security
                                            Security Risk                                                                              operations of the customer's infrastructure environment
          Lack of                                                Sharing risk




                                                                                                                                                     {                                                                                                      {
                              Cost          Measurement                               Services             Security
          qualified                                              with Trusted
                          Optimization          and                                 Accountability        Awareness
           experts                                                 Partners
                                            Management
                                                                                                                                                          Improve security posture         Ensure Business continuity and
                                                                                                                                                              and compliance                                                           Reduce Operational
                                                                                                                                                                                           effective Incident management                      cost
                                                                                                                                                                adherence



                                                                                                                                                                                      Managed Security Services
HCL Information Security                                                                                                                 Security Solution       Security Solution         Managed Endpoint
Services Portfolio                                                                                                                       Monitoring              Management                Security Services           Anti-Phishing                  Anti-Malware
                                                                                                                                         (On-site / remote)      (On-site / remote)
HCL's Information Security Service portfolio has been designed to deliver strategic, financial & technical benefits to customers and    SIEM based
                                                                                                                                        4                       Policy
                                                                                                                                                                4                         Virus / malware
                                                                                                                                                                                          4                            Proactive Domain &
                                                                                                                                                                                                                       4                              Web application
                                                                                                                                                                                                                                                      4
take the customer organization to the desired state of the Information Security robustness.                                                Event                   Management               / spyware                    Phishing URLs                  Malware
                                                                                                                                           Monitoring &                                     Monitoring                   Monitoring                     monitoring
                                                                                                                                           Analysis             Change Mgmt
                                                                                                                                                                4
HCL's ability to meet the information security needs across industry verticals, with commitment of quality delivery and partnering                                                        Outbreak Prevention
                                                                                                                                                                                          4                            Abuse Email
                                                                                                                                                                                                                       4                              Web application
                                                                                                                                                                                                                                                      4
approach, has positioned HCL as a leader in this segment. HCL has a wide spectrum of service portfolio ranging from Consulting to       Performance
                                                                                                                                        4                       Configuration
                                                                                                                                                                4                                                        Forwarding                     malware
Managed security services delivering maximum benefits at a reduced cost.                                                                   Monitoring              Mgmt                   4 Updates
                                                                                                                                                                                          Signatures
                                                                                                                                                                                                                       4 site
                                                                                                                                                                                                                       Phishing web                   Malicious code
                                                                                                                                                                                                                                                      4
                                                                                                                                        Incident Mgmt
                                                                                                                                        4                       Signature updates
                                                                                                                                                                4                         4 Mgmt
                                                                                                                                                                                          Compliance                     takedown                       sandbox analysis
                                   HCL Information Security Services                                                                    Alert &
                                                                                                                                        4                       4 tuning
                                                                                                                                                                Device fine               Deviation reporting
                                                                                                                                                                                          4                            4and
                                                                                                                                                                                                                       Reporting                      Forensics &
                                                                                                                                                                                                                                                      4
                                                                                                                                           Notification                                                                  Forensics analysis             Malware
                                                                                                                                                                Version Upgrade
                                                                                                                                                                4                         Uniform policy
                                                                                                                                                                                          4
                                                                                                                                                                                                                                                        reporting
    Info Sec                        Identity & Access                Managed Security                  Professional &                   CXO Report
                                                                                                                                        4                                                   management
    Consulting Services             Management Services              Services                          SI Services                                              Reporting
                                                                                                                                                                4
                                                                                                                                        Compliance
                                                                                                                                        4                                                 Configuration
                                                                                                                                                                                          4
 Security Compliance
 4                                4 and
                                  Architecture                     Security Incident
                                                                   4                                 Solution Integration and
                                                                                                     4                                     report                                           management
 Consulting                       consulting                       Monitoring & Alerting             implementation
 Security Design &
 4                                Access Management
                                  4
                                                                   Service (on-site / remote)        4 support
                                                                                                     OEM product
 Architecture                     Solution                         Security Infrastructure
                                                                   4
                                                                                                     4 and
                                                                                                     Tech refresh
 Security Audit &
 4                                Identity Management
                                  4
                                                                   Mgmt                              migration                           Standard Solutions Covered                                                                           Other Devices / Systems
 Assessment                       Solution                         4 Assessment
                                                                   Vulnerability                     4 design
                                                                                                     Date Center
 Vulnerability
 4                                Identity auditing
                                  4                                Anti Phishing Service
                                                                   4                                                                     Routers
                                                                                                                                         4                                                                                                    4Unix / Wintel
                                                                                                                                                                                                                                              Systems –
                                                                                                     4 design
                                                                                                     Captive SOC
 Assessment                       Directory Service                Anti Malware Service
                                  4                                4
                                                                                                     Project Management
                                                                                                     4                                   4 threat mgmt)
                                                                                                                                         UTM (unified                                                                                         4 Applications
                                                                                                                                                                                                                                              Web Servers
 4 Test
 Penetration                      Authentication Service
                                  4                                Managed Endpoint
                                                                   4
                                                                                                     Product Evaluation
 Security policy & process
 4                                                                 Security Services
                                                                                                     4                                   Firewall
                                                                                                                                         4                                                                                                    Database Servers
                                                                                                                                                                                                                                              4
                                  Implementation &
                                  4
                                                                                                     On-site Support Service
 consulting                       Integration                      Managed authentication
                                                                                                     4                                   VPN
                                                                                                                                         4                                                                                                    IAM Solution
                                                                                                                                                                                                                                              4
                                                                   4                                                                                                                            Log Management
 Security roadmap
 4
                                  Managed IAM service              service                                                                                                                              &
 framework consulting
                                  4                                                                                                      4 / appliance
                                                                                                                                         Proxy Server                                                                                         AAA Servers
                                                                                                                                                                                                                                              4
                                                                   4 Monitoring &
                                                                   Transaction                                                                                                               Security Event Analysis
                                  Roadmap Assessment
                                  4                                                                                                      NIDS/NIPS                                                                                            Anti Virus
                                                                   Analysis                                                              4                                                         Framework                                  4
                                  OEM evaluation
                                  4
                                                                   4Service
                                                                   OEM ROS                                                               4 AV/Host
                                                                                                                                         HIDS/Host                                                                                            VA Scanners
                                                                                                                                                                                                                                              4
                                                                                                                                           Firewalls                                             Unified Visibility
                                                                                                                                                                                                      Portal                                  Mainframe
                                                                                                                                                                                                                                              4
                                           HCL Center of Service Excellence                                                              End point security solution
                                                                                                                                         4
                                                                                                                                                                                                                                              Content Filters
                                                                                                                                                                                                                                              4
                      Proof of Concept Lab           Solution Engineering                            Service Engineering                 NAC / NAP
                                                                                                                                         4
                                                                                                                                                                                                                                              E-mail security
                                                                                                                                                                                                                                              4
                                                                                                                                         4 Leak
                                                                                                                                         DLP (Data
    Banking &                                                                                                                              Preventions)                                                                                       Patch Management
                                                                                                                                                                                                                                              4
                        Life Science                     Manufacturing &             Hi-Tech                            Govt. &
     Financial          & HealthCare        Retail                                 Engineering         Telecom
     Services                                              Distribution                                                 Defense          Encryption
                                                                                                                                         4
Why Outsource Security                                                                                                                 Managed Security
Services
As enterprises grow, so does the requirement for global information exchange amongst employees, suppliers, partners and
                                                                                                                                       Services
customers. However, as this information becomes more broadly distributed, threats to the confidentiality, integrity and availability
of this information increase exponentially. The utmost negative impact of advancement of technology is an exponential increase in
security threats such as Cyber threats, Malware infections, Phishing attacks, Web Application Attacks etc. All these security
breaches may result in drastic revenue loss, legal liabilities, diminished productivity and brand erosion. It becomes imperative for
Enterprises to look out for those partners, who can work with them to build up business aligned information security framework
and improve the ROSI (Return on Security Investment). Service providers with end to end capability are becoming default choice         HCL's Managed Security Services from four fully operational Security Operation centers (SOC) offer real-time protection to the
for Enterprises.                                                                                                                       organizations, thereby reducing their risks in today's ever-changing security threat environment. Balanced approach, maintaining
                                                                                                                                       compliance, proactive security stance, technophobic to techno centric focus and flexible delivery model is what HCL managed security




    {                                                                                                                    {
                                                                                                                                       services offers to its customers across the globe. The service offering are bundled in a manner so as to take care of the entire security
                                            Security Risk                                                                              operations of the customer's infrastructure environment
          Lack of                                                Sharing risk




                                                                                                                                                     {                                                                                                      {
                              Cost          Measurement                               Services             Security
          qualified                                              with Trusted
                          Optimization          and                                 Accountability        Awareness
           experts                                                 Partners
                                            Management
                                                                                                                                                          Improve security posture         Ensure Business continuity and
                                                                                                                                                              and compliance                                                           Reduce Operational
                                                                                                                                                                                           effective Incident management                      cost
                                                                                                                                                                adherence



                                                                                                                                                                                      Managed Security Services
HCL Information Security                                                                                                                 Security Solution       Security Solution         Managed Endpoint
Services Portfolio                                                                                                                       Monitoring              Management                Security Services           Anti-Phishing                  Anti-Malware
                                                                                                                                         (On-site / remote)      (On-site / remote)
HCL's Information Security Service portfolio has been designed to deliver strategic, financial & technical benefits to customers and    SIEM based
                                                                                                                                        4                       Policy
                                                                                                                                                                4                         Virus / malware
                                                                                                                                                                                          4                            Proactive Domain &
                                                                                                                                                                                                                       4                              Web application
                                                                                                                                                                                                                                                      4
take the customer organization to the desired state of the Information Security robustness.                                                Event                   Management               / spyware                    Phishing URLs                  Malware
                                                                                                                                           Monitoring &                                     Monitoring                   Monitoring                     monitoring
                                                                                                                                           Analysis             Change Mgmt
                                                                                                                                                                4
HCL's ability to meet the information security needs across industry verticals, with commitment of quality delivery and partnering                                                        Outbreak Prevention
                                                                                                                                                                                          4                            Abuse Email
                                                                                                                                                                                                                       4                              Web application
                                                                                                                                                                                                                                                      4
approach, has positioned HCL as a leader in this segment. HCL has a wide spectrum of service portfolio ranging from Consulting to       Performance
                                                                                                                                        4                       Configuration
                                                                                                                                                                4                                                        Forwarding                     malware
Managed security services delivering maximum benefits at a reduced cost.                                                                   Monitoring              Mgmt                   4 Updates
                                                                                                                                                                                          Signatures
                                                                                                                                                                                                                       4 site
                                                                                                                                                                                                                       Phishing web                   Malicious code
                                                                                                                                                                                                                                                      4
                                                                                                                                        Incident Mgmt
                                                                                                                                        4                       Signature updates
                                                                                                                                                                4                         4 Mgmt
                                                                                                                                                                                          Compliance                     takedown                       sandbox analysis
                                   HCL Information Security Services                                                                    Alert &
                                                                                                                                        4                       4 tuning
                                                                                                                                                                Device fine               Deviation reporting
                                                                                                                                                                                          4                            4and
                                                                                                                                                                                                                       Reporting                      Forensics &
                                                                                                                                                                                                                                                      4
                                                                                                                                           Notification                                                                  Forensics analysis             Malware
                                                                                                                                                                Version Upgrade
                                                                                                                                                                4                         Uniform policy
                                                                                                                                                                                          4
                                                                                                                                                                                                                                                        reporting
    Info Sec                        Identity & Access                Managed Security                  Professional &                   CXO Report
                                                                                                                                        4                                                   management
    Consulting Services             Management Services              Services                          SI Services                                              Reporting
                                                                                                                                                                4
                                                                                                                                        Compliance
                                                                                                                                        4                                                 Configuration
                                                                                                                                                                                          4
 Security Compliance
 4                                4 and
                                  Architecture                     Security Incident
                                                                   4                                 Solution Integration and
                                                                                                     4                                     report                                           management
 Consulting                       consulting                       Monitoring & Alerting             implementation
 Security Design &
 4                                Access Management
                                  4
                                                                   Service (on-site / remote)        4 support
                                                                                                     OEM product
 Architecture                     Solution                         Security Infrastructure
                                                                   4
                                                                                                     4 and
                                                                                                     Tech refresh
 Security Audit &
 4                                Identity Management
                                  4
                                                                   Mgmt                              migration                           Standard Solutions Covered                                                                           Other Devices / Systems
 Assessment                       Solution                         4 Assessment
                                                                   Vulnerability                     4 design
                                                                                                     Date Center
 Vulnerability
 4                                Identity auditing
                                  4                                Anti Phishing Service
                                                                   4                                                                     Routers
                                                                                                                                         4                                                                                                    4Unix / Wintel
                                                                                                                                                                                                                                              Systems –
                                                                                                     4 design
                                                                                                     Captive SOC
 Assessment                       Directory Service                Anti Malware Service
                                  4                                4
                                                                                                     Project Management
                                                                                                     4                                   4 threat mgmt)
                                                                                                                                         UTM (unified                                                                                         4 Applications
                                                                                                                                                                                                                                              Web Servers
 4 Test
 Penetration                      Authentication Service
                                  4                                Managed Endpoint
                                                                   4
                                                                                                     Product Evaluation
 Security policy & process
 4                                                                 Security Services
                                                                                                     4                                   Firewall
                                                                                                                                         4                                                                                                    Database Servers
                                                                                                                                                                                                                                              4
                                  Implementation &
                                  4
                                                                                                     On-site Support Service
 consulting                       Integration                      Managed authentication
                                                                                                     4                                   VPN
                                                                                                                                         4                                                                                                    IAM Solution
                                                                                                                                                                                                                                              4
                                                                   4                                                                                                                            Log Management
 Security roadmap
 4
                                  Managed IAM service              service                                                                                                                              &
 framework consulting
                                  4                                                                                                      4 / appliance
                                                                                                                                         Proxy Server                                                                                         AAA Servers
                                                                                                                                                                                                                                              4
                                                                   4 Monitoring &
                                                                   Transaction                                                                                                               Security Event Analysis
                                  Roadmap Assessment
                                  4                                                                                                      NIDS/NIPS                                                                                            Anti Virus
                                                                   Analysis                                                              4                                                         Framework                                  4
                                  OEM evaluation
                                  4
                                                                   4Service
                                                                   OEM ROS                                                               4 AV/Host
                                                                                                                                         HIDS/Host                                                                                            VA Scanners
                                                                                                                                                                                                                                              4
                                                                                                                                           Firewalls                                             Unified Visibility
                                                                                                                                                                                                      Portal                                  Mainframe
                                                                                                                                                                                                                                              4
                                           HCL Center of Service Excellence                                                              End point security solution
                                                                                                                                         4
                                                                                                                                                                                                                                              Content Filters
                                                                                                                                                                                                                                              4
                      Proof of Concept Lab           Solution Engineering                            Service Engineering                 NAC / NAP
                                                                                                                                         4
                                                                                                                                                                                                                                              E-mail security
                                                                                                                                                                                                                                              4
                                                                                                                                         4 Leak
                                                                                                                                         DLP (Data
    Banking &                                                                                                                              Preventions)                                                                                       Patch Management
                                                                                                                                                                                                                                              4
                        Life Science                     Manufacturing &             Hi-Tech                            Govt. &
     Financial          & HealthCare        Retail                                 Engineering         Telecom
     Services                                              Distribution                                                 Defense          Encryption
                                                                                                                                         4
Information Security                                                                                                                   Identity & Access Management
                                                                                                                                       Service Offerings
Consulting Services
HCL's decade old Information Security Consulting practice helps its customers across the globe to identify, evaluate, and improve      HCL's Identity and Access Management Practice provides increased focus to secure the organization and protect confidential and
overall security posture of enterprise. These services are based on widely accepted recognized standards and best practices, and are   personal data with a comprehensive and focused approach combined with robust solutions and services.
oriented to the unique need of organizations.
A team of certified security consultants who has rich experience in security domain helps organization in building a strong security   After a detailed analysis of customer's requirements and expectations, HCL has aligned its Identity and Access Management
posture that helps reduce costs, improve service, and manage risk.                                                                     Service offerings in Horizontal and Vertical layers as shown below. The intention of this model is to bind together the horizontal and
                                                                                                                                       vertical layers (each offering its own specialized services) seamlessly to drive an end to end Identity and Access Management
              Information Security Consulting, Design and Assessment Service                                                           program.


   Security                                                                                                                                               Identity                Access                 Privileged             Identity               Authentication
                                              Security Design &                         Security Audit &
   Compliance &                                                                                                                                           Management              Management             Identity               Governance             Services
                                              Architecture Services                     Assessment Services
   Consulting Services                                                                                                                                    Services                Services               Services               Services
                                             4 Security
                                             Enterprise                                 4 Approved
                                                                                        PCI Council
   PCI-DSS Consulting and
   4                                            Roadmap                                   Scanning Service (ASV)
     Certification Service                                                                                                             Integration        Identity Life
                                                                                                                                                          4                       Web Access
                                                                                                                                                                                  4                      Privileged
                                                                                                                                                                                                         4                      Role
                                                                                                                                                                                                                                4                     Multi Factor
                                                                                                                                                                                                                                                      4
                                             4 Security
                                             Enterprise                                 Wireless Security
                                                                                        4                                                                   Cycle                   Management             Remote Access          Engineering           Authentication
   ISO 27001:2005 Consulting and
   4                                            Roadmap Consulting                        Assessment                                   Services             Management                                                            and Modeling
     Implementation Service
                                             Data Centre
                                             4                                          Industry Vertical aligned
                                                                                        4
   4 Security Policy
   Information                                  Architecture Design                       Security Assessment
     and Process Consulting
                                             M & A Consulting for
                                             4                                          4 Security Audit
                                                                                        Information                                    Directory          Access
                                                                                                                                                          4                       Enterprise
                                                                                                                                                                                  4                      Privileged
                                                                                                                                                                                                         4                      SoD
                                                                                                                                                                                                                                4                     Adaptive
                                                                                                                                                                                                                                                      4
   DLP Consulting
   4                                            Security re-architecture                  and Gap Analysis                                                  Provisioning                                   Session                Compliance            Authentication
                                                                                                                                       Services                                     Single Sign On
   4 Consulting Services
   Anti-Fraud                                                                                                                                                                                              Management
                                             Vertical Aligned
                                             4                                          4 Assessment &
                                                                                        Vulnerability
                                                Security Design                           Penetration Test Apps
   4 Security
   Application                                  Services                                  Security Assessment
     Consulting                                                                                                                        Compliance,
                                                                                                                                                          4 Role
                                                                                                                                                          Centralized             Web Single
                                                                                                                                                                                  4                     Privileged
                                                                                                                                                                                                        4                       Identity
                                                                                                                                                                                                                                4                     Out Of Band
                                                                                                                                                                                                                                                      4
                                                                                                                                       Auditing &           Management              Sign On                Single Sign On         Assurance             Authentication
                                                                                                                                       Reporting            & Attestations

Professional                             Services                                                                                                                                                       Auditing &
                                                                                                                                                                                                        4                       4 &
                                                                                                                                                                                                                                Entitlement
HCL adopts a phased approach for professional services and offer clients a comprehensive information security lifecycle service,       Migration          Work Flow
                                                                                                                                                          4                       Federation
                                                                                                                                                                                  4                        Reporting of           Access              Authentication
                                                                                                                                                                                                                                                      4
                                                                                                                                                            Design and              Service                                                             Brokerage
through every stage of any transformation initiative. The key differentiator in the engagement approach is that it works with the      Services             Implementation                                 Privileged             Certification
customer as their partner in their business aligned Information Security program and not just as the reseller or an external service                                                                       Session
provider.
This highly skilled and niche service portfolio, encompass the design, development and deployment of solutions and services that
secure organization's information assets and infrastructure.HCL specializes in creating secure enterprise architectures, providing     Development                                Role Based
                                                                                                                                                                                  4                                                                   Managed
                                                                                                                                                                                                                                                      4
the strategies and enablers that secure entire IT framework of any organization from any industry vertical.                            Services                                     Access Control                                                      Authentication
                                                                                                                                                                                                                                                        Services
                                       Security Professional & SI Services
   Solution Design &                Project                            Product Evaluation               Sustenance Service             Advisory                                   OS Access
                                                                                                                                                                                  4
   Integration                      Management                         & Testing                                                                                                  Control
                                                                                                                                       Services
   Solution design &
   4                                Project planning
                                    4                                 Business requirement
                                                                      4                                 Device Management
                                                                                                        4
     implementation                                                        assessment
                                    Project
                                    4                                                                   Periodic maintenance
                                                                                                        4
   Solution Integration
   4                                  management                      4 evaluation
                                                                      Technology
     with other                                                                                         4 update
                                                                                                        Upgrade &
     components                     4 vendor
                                    Third party                       Vendor evaluation
                                                                      4
                                      coordination                                                      Configuration
                                                                                                        4
   Technical refresh
   4                                                                  Product mapping
                                                                      4                                   management
                                    OEM coordination
                                    4
   Migration service
   4                                                                  Solution specification
                                                                      4                                 Problem management
                                                                                                        4
                                    M&A planning and
                                    4                                      mapping
   Captive setup
   4                                  execution                                                         Change management
                                                                                                        4
     design                                                           Product UAT
                                                                      4
                                    Project governance
                                    4                                                                   Vendor management
                                                                                                        4
   4and
   DC design                          and management                                                    On-site facility
                                                                                                        4
     implementation                                                                                       management
Information Security                                                                                                                   Identity & Access Management
                                                                                                                                       Service Offerings
Consulting Services
HCL's decade old Information Security Consulting practice helps its customers across the globe to identify, evaluate, and improve      HCL's Identity and Access Management Practice provides increased focus to secure the organization and protect confidential and
overall security posture of enterprise. These services are based on widely accepted recognized standards and best practices, and are   personal data with a comprehensive and focused approach combined with robust solutions and services.
oriented to the unique need of organizations.
A team of certified security consultants who has rich experience in security domain helps organization in building a strong security   After a detailed analysis of customer's requirements and expectations, HCL has aligned its Identity and Access Management
posture that helps reduce costs, improve service, and manage risk.                                                                     Service offerings in Horizontal and Vertical layers as shown below. The intention of this model is to bind together the horizontal and
                                                                                                                                       vertical layers (each offering its own specialized services) seamlessly to drive an end to end Identity and Access Management
              Information Security Consulting, Design and Assessment Service                                                           program.


   Security                                                                                                                                               Identity                Access                 Privileged             Identity               Authentication
                                              Security Design &                         Security Audit &
   Compliance &                                                                                                                                           Management              Management             Identity               Governance             Services
                                              Architecture Services                     Assessment Services
   Consulting Services                                                                                                                                    Services                Services               Services               Services
                                             4 Security
                                             Enterprise                                 4 Approved
                                                                                        PCI Council
   PCI-DSS Consulting and
   4                                            Roadmap                                   Scanning Service (ASV)
     Certification Service                                                                                                             Integration        Identity Life
                                                                                                                                                          4                       Web Access
                                                                                                                                                                                  4                      Privileged
                                                                                                                                                                                                         4                      Role
                                                                                                                                                                                                                                4                     Multi Factor
                                                                                                                                                                                                                                                      4
                                             4 Security
                                             Enterprise                                 Wireless Security
                                                                                        4                                                                   Cycle                   Management             Remote Access          Engineering           Authentication
   ISO 27001:2005 Consulting and
   4                                            Roadmap Consulting                        Assessment                                   Services             Management                                                            and Modeling
     Implementation Service
                                             Data Centre
                                             4                                          Industry Vertical aligned
                                                                                        4
   4 Security Policy
   Information                                  Architecture Design                       Security Assessment
     and Process Consulting
                                             M & A Consulting for
                                             4                                          4 Security Audit
                                                                                        Information                                    Directory          Access
                                                                                                                                                          4                       Enterprise
                                                                                                                                                                                  4                      Privileged
                                                                                                                                                                                                         4                      SoD
                                                                                                                                                                                                                                4                     Adaptive
                                                                                                                                                                                                                                                      4
   DLP Consulting
   4                                            Security re-architecture                  and Gap Analysis                                                  Provisioning                                   Session                Compliance            Authentication
                                                                                                                                       Services                                     Single Sign On
   4 Consulting Services
   Anti-Fraud                                                                                                                                                                                              Management
                                             Vertical Aligned
                                             4                                          4 Assessment &
                                                                                        Vulnerability
                                                Security Design                           Penetration Test Apps
   4 Security
   Application                                  Services                                  Security Assessment
     Consulting                                                                                                                        Compliance,
                                                                                                                                                          4 Role
                                                                                                                                                          Centralized             Web Single
                                                                                                                                                                                  4                     Privileged
                                                                                                                                                                                                        4                       Identity
                                                                                                                                                                                                                                4                     Out Of Band
                                                                                                                                                                                                                                                      4
                                                                                                                                       Auditing &           Management              Sign On                Single Sign On         Assurance             Authentication
                                                                                                                                       Reporting            & Attestations

Professional                             Services                                                                                                                                                       Auditing &
                                                                                                                                                                                                        4                       4 &
                                                                                                                                                                                                                                Entitlement
HCL adopts a phased approach for professional services and offer clients a comprehensive information security lifecycle service,       Migration          Work Flow
                                                                                                                                                          4                       Federation
                                                                                                                                                                                  4                        Reporting of           Access              Authentication
                                                                                                                                                                                                                                                      4
                                                                                                                                                            Design and              Service                                                             Brokerage
through every stage of any transformation initiative. The key differentiator in the engagement approach is that it works with the      Services             Implementation                                 Privileged             Certification
customer as their partner in their business aligned Information Security program and not just as the reseller or an external service                                                                       Session
provider.
This highly skilled and niche service portfolio, encompass the design, development and deployment of solutions and services that
secure organization's information assets and infrastructure.HCL specializes in creating secure enterprise architectures, providing     Development                                Role Based
                                                                                                                                                                                  4                                                                   Managed
                                                                                                                                                                                                                                                      4
the strategies and enablers that secure entire IT framework of any organization from any industry vertical.                            Services                                     Access Control                                                      Authentication
                                                                                                                                                                                                                                                        Services
                                       Security Professional & SI Services
   Solution Design &                Project                            Product Evaluation               Sustenance Service             Advisory                                   OS Access
                                                                                                                                                                                  4
   Integration                      Management                         & Testing                                                                                                  Control
                                                                                                                                       Services
   Solution design &
   4                                Project planning
                                    4                                 Business requirement
                                                                      4                                 Device Management
                                                                                                        4
     implementation                                                        assessment
                                    Project
                                    4                                                                   Periodic maintenance
                                                                                                        4
   Solution Integration
   4                                  management                      4 evaluation
                                                                      Technology
     with other                                                                                         4 update
                                                                                                        Upgrade &
     components                     4 vendor
                                    Third party                       Vendor evaluation
                                                                      4
                                      coordination                                                      Configuration
                                                                                                        4
   Technical refresh
   4                                                                  Product mapping
                                                                      4                                   management
                                    OEM coordination
                                    4
   Migration service
   4                                                                  Solution specification
                                                                      4                                 Problem management
                                                                                                        4
                                    M&A planning and
                                    4                                      mapping
   Captive setup
   4                                  execution                                                         Change management
                                                                                                        4
     design                                                           Product UAT
                                                                      4
                                    Project governance
                                    4                                                                   Vendor management
                                                                                                        4
   4and
   DC design                          and management                                                    On-site facility
                                                                                                        4
     implementation                                                                                       management
Why HCL
                                    ?                                                                  Partner & Analysts Speak
                                                                                                                                          Highlighted amongst top security service providers with
                 Differentiator                           Benefits to Customers                           FORRESTER
                                                                                                                                         security ecosystem built on technology partners & service



             {                                                                                     {
                 Capability to address end-to-end
                 Spectrum of Security Services and
 Coverage        ability to address Information
                                                          One Partner who can help in building
                                                          business/industry vertical aligned                                                            Authorized Scanning Vendor (ASV)
                 Security Life-cycle need for             Information Security Framework                                                                    by PCI Council Since 2005
                 enterprises from any industry vertical




             {                                                                                     {
                                                                                                                                                          Rated "Positive" MSSP in Europe
                                                          Expertise on Tap, across the breadth
                 Large Pool of Security Resources         of information security domain. No
    People
                                                          need to retain costly security SMEs in
                                                          the role.                                                                                         Cisco Masters Certification
                                                                                                                                                      "First Organization in ASPAC Region”


Innovation

             {   Dedicated HCL innovation centre
                 provides POC, technology refresh &
                 optimization process
                                                          Lower investments on new
                                                          Technology

                                                                                                   {                                              Cert-In Empanelled IT Security Audit Organization


                                                                                                                                                   Rated No. 1 Security Services Provider in India

Technology

             {   Diversified technological partnerships
                 with All security vendors
                                                          Experience and Capability to handle
                                                          complex multi-vendor and
                                                          heterogeneous client environments

                                                                                                   {
      Cost

             {   HCL offers world class security
                 service to improve customer's ROSI
                 (Return on Security Investment)
                                                          Reduce operation cost, hassle free
                                                          handling of domain experts, no effect
                                                          of attrition, increase efficiency and
                                                          profitability
                                                                                                   {    Customers Spe k
                                                                                                        Appreciation from Cyril Moneron, CISO,
                                                                                                        World's leading Glass Manufacturer: “I
                                                                                                        would like to congratulate the project
                                                                                                                                                 Appreciation from Fortune 500 Energy &
                                                                                                                                                 Utilities Organization: “I have managed
                                                                                                                                                 security teams from 5 to 250 over the
                                                                                                                                                                                             Security Consulting team received
                                                                                                                                                                                             appreciation from senior management of
                                                                                                                                                                                             Leading PSU bank in India: “ We are




             {                                                                                     {
                                                                                                        team... thanks to the commitment & the   past 29 years, both physical and            happy with the way you have been
                                                                                                        professionalism of all team members.     electronic, and happy to let you know you   coordinating various security
                                                                                                        And extensively, a very good support     rank among the best. Your dedication to     consultancy and audit activities to
                                                                                                        from HCL Management”                     work, commitment to the Oncor security      address our bank’s assignments and
                 Large enterprise clients for             Experience through leadership and                                                      mission and to Oncor Electric Delivery is   priorities. Audit findings and guidance
Experience                                                                                                                                       greatly appreciated.. JD”                   given to the Bank has been very useful
                 Information Security Services            availability of large knowledge base                                                                                               and timely.”




   Process

             {   HCL follows a Defined & mature
                 Operational Processes
                                                          Customer can leverage HCL's process
                                                          consultants to define and
                                                          continuously improve delivery
                                                          processes
                                                                                                   {
HCLT Brochure: HCL Information Security Services
HCLT Brochure: HCL Information Security Services

Mais conteúdo relacionado

Destaque

Physical Security - Why Your Business Needs It
Physical Security - Why Your Business Needs ItPhysical Security - Why Your Business Needs It
Physical Security - Why Your Business Needs ItTerra Verde
 
Delivering an incredible price to benefit ratio!
Delivering an incredible price to benefit ratio!Delivering an incredible price to benefit ratio!
Delivering an incredible price to benefit ratio!HCL Technologies
 
Social Media Management using Socialytics
Social Media Management using SocialyticsSocial Media Management using Socialytics
Social Media Management using SocialyticsHCL Technologies
 
Being there first matters!
Being there first matters!Being there first matters!
Being there first matters!HCL Technologies
 
Customer Centricity: Adapting to a Changing Global Market
Customer Centricity: Adapting to a Changing Global MarketCustomer Centricity: Adapting to a Changing Global Market
Customer Centricity: Adapting to a Changing Global MarketHCL Technologies
 
Experience next generation Engineering!
Experience next generation Engineering!Experience next generation Engineering!
Experience next generation Engineering!HCL Technologies
 
Wie ideapreneure beziehungen über den vertrag hinaus nutzen
Wie ideapreneure beziehungen über den vertrag hinaus nutzenWie ideapreneure beziehungen über den vertrag hinaus nutzen
Wie ideapreneure beziehungen über den vertrag hinaus nutzenHCL Technologies
 
Managed Security Services Infographic
Managed Security Services InfographicManaged Security Services Infographic
Managed Security Services InfographicUnisys Corporation
 
SHIV NADAR AS SUCCESSFUL ENTREPRENUER
SHIV NADAR AS SUCCESSFUL ENTREPRENUERSHIV NADAR AS SUCCESSFUL ENTREPRENUER
SHIV NADAR AS SUCCESSFUL ENTREPRENUERarchana29
 

Destaque (10)

Physical Security - Why Your Business Needs It
Physical Security - Why Your Business Needs ItPhysical Security - Why Your Business Needs It
Physical Security - Why Your Business Needs It
 
Delivering an incredible price to benefit ratio!
Delivering an incredible price to benefit ratio!Delivering an incredible price to benefit ratio!
Delivering an incredible price to benefit ratio!
 
Social Media Management using Socialytics
Social Media Management using SocialyticsSocial Media Management using Socialytics
Social Media Management using Socialytics
 
Being there first matters!
Being there first matters!Being there first matters!
Being there first matters!
 
HCL facilities
HCL facilitiesHCL facilities
HCL facilities
 
Customer Centricity: Adapting to a Changing Global Market
Customer Centricity: Adapting to a Changing Global MarketCustomer Centricity: Adapting to a Changing Global Market
Customer Centricity: Adapting to a Changing Global Market
 
Experience next generation Engineering!
Experience next generation Engineering!Experience next generation Engineering!
Experience next generation Engineering!
 
Wie ideapreneure beziehungen über den vertrag hinaus nutzen
Wie ideapreneure beziehungen über den vertrag hinaus nutzenWie ideapreneure beziehungen über den vertrag hinaus nutzen
Wie ideapreneure beziehungen über den vertrag hinaus nutzen
 
Managed Security Services Infographic
Managed Security Services InfographicManaged Security Services Infographic
Managed Security Services Infographic
 
SHIV NADAR AS SUCCESSFUL ENTREPRENUER
SHIV NADAR AS SUCCESSFUL ENTREPRENUERSHIV NADAR AS SUCCESSFUL ENTREPRENUER
SHIV NADAR AS SUCCESSFUL ENTREPRENUER
 

Mais de HCL Technologies

Emergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and ManagementEmergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and ManagementHCL Technologies
 
USING FACTORY DESIGN PATTERNS IN MAP REDUCE DESIGN FOR BIG DATA ANALYTICS
USING FACTORY DESIGN PATTERNS IN MAP REDUCE DESIGN FOR BIG DATA ANALYTICSUSING FACTORY DESIGN PATTERNS IN MAP REDUCE DESIGN FOR BIG DATA ANALYTICS
USING FACTORY DESIGN PATTERNS IN MAP REDUCE DESIGN FOR BIG DATA ANALYTICSHCL Technologies
 
HCL HELPS A US BASED WIRELINE TELECOM OPERATOR FOR BETTER LEAD-TO-CASH AND TH...
HCL HELPS A US BASED WIRELINE TELECOM OPERATOR FOR BETTER LEAD-TO-CASH AND TH...HCL HELPS A US BASED WIRELINE TELECOM OPERATOR FOR BETTER LEAD-TO-CASH AND TH...
HCL HELPS A US BASED WIRELINE TELECOM OPERATOR FOR BETTER LEAD-TO-CASH AND TH...HCL Technologies
 
HCL HELPS A LEADING US TELECOM PROTECT ITS MARKET SHARE AND MAINTAIN HIGH LEV...
HCL HELPS A LEADING US TELECOM PROTECT ITS MARKET SHARE AND MAINTAIN HIGH LEV...HCL HELPS A LEADING US TELECOM PROTECT ITS MARKET SHARE AND MAINTAIN HIGH LEV...
HCL HELPS A LEADING US TELECOM PROTECT ITS MARKET SHARE AND MAINTAIN HIGH LEV...HCL Technologies
 
Noise Control of Vacuum Cleaners
Noise Control of Vacuum CleanersNoise Control of Vacuum Cleaners
Noise Control of Vacuum CleanersHCL Technologies
 
Cost-effective Video Analytics in Smart Cities
Cost-effective Video Analytics in Smart CitiesCost-effective Video Analytics in Smart Cities
Cost-effective Video Analytics in Smart CitiesHCL Technologies
 
A novel approach towards a Smarter DSLR Camera
A novel approach towards a Smarter DSLR CameraA novel approach towards a Smarter DSLR Camera
A novel approach towards a Smarter DSLR CameraHCL Technologies
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devicesHCL Technologies
 
Connected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian ScenarioConnected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian ScenarioHCL Technologies
 
A Sigh of Relief for Patients with Chronic Diseases
A Sigh of Relief for Patients with Chronic DiseasesA Sigh of Relief for Patients with Chronic Diseases
A Sigh of Relief for Patients with Chronic DiseasesHCL Technologies
 
Painting a Social & Mobile Picture in Real Time
Painting a Social & Mobile Picture in Real TimePainting a Social & Mobile Picture in Real Time
Painting a Social & Mobile Picture in Real TimeHCL Technologies
 
A Novel Design Approach for Electronic Equipment - FEA Based Methodology
A Novel Design Approach for Electronic Equipment - FEA Based MethodologyA Novel Design Approach for Electronic Equipment - FEA Based Methodology
A Novel Design Approach for Electronic Equipment - FEA Based MethodologyHCL Technologies
 
Intrusion Detection System (IDS)
Intrusion Detection System (IDS)Intrusion Detection System (IDS)
Intrusion Detection System (IDS)HCL Technologies
 
Manufacturing Automation and Digitization
Manufacturing Automation and DigitizationManufacturing Automation and Digitization
Manufacturing Automation and DigitizationHCL Technologies
 
Managing Customer Care in Digital
Managing Customer Care in DigitalManaging Customer Care in Digital
Managing Customer Care in DigitalHCL Technologies
 
Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...
Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...
Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...HCL Technologies
 
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...HCL Technologies
 
Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...
Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...
Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...HCL Technologies
 
Transform and Modernize -UK's leading specialists in Pension and Employee Ben...
Transform and Modernize -UK's leading specialists in Pension and Employee Ben...Transform and Modernize -UK's leading specialists in Pension and Employee Ben...
Transform and Modernize -UK's leading specialists in Pension and Employee Ben...HCL Technologies
 

Mais de HCL Technologies (20)

Emergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and ManagementEmergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and Management
 
USING FACTORY DESIGN PATTERNS IN MAP REDUCE DESIGN FOR BIG DATA ANALYTICS
USING FACTORY DESIGN PATTERNS IN MAP REDUCE DESIGN FOR BIG DATA ANALYTICSUSING FACTORY DESIGN PATTERNS IN MAP REDUCE DESIGN FOR BIG DATA ANALYTICS
USING FACTORY DESIGN PATTERNS IN MAP REDUCE DESIGN FOR BIG DATA ANALYTICS
 
HCL HELPS A US BASED WIRELINE TELECOM OPERATOR FOR BETTER LEAD-TO-CASH AND TH...
HCL HELPS A US BASED WIRELINE TELECOM OPERATOR FOR BETTER LEAD-TO-CASH AND TH...HCL HELPS A US BASED WIRELINE TELECOM OPERATOR FOR BETTER LEAD-TO-CASH AND TH...
HCL HELPS A US BASED WIRELINE TELECOM OPERATOR FOR BETTER LEAD-TO-CASH AND TH...
 
HCL HELPS A LEADING US TELECOM PROTECT ITS MARKET SHARE AND MAINTAIN HIGH LEV...
HCL HELPS A LEADING US TELECOM PROTECT ITS MARKET SHARE AND MAINTAIN HIGH LEV...HCL HELPS A LEADING US TELECOM PROTECT ITS MARKET SHARE AND MAINTAIN HIGH LEV...
HCL HELPS A LEADING US TELECOM PROTECT ITS MARKET SHARE AND MAINTAIN HIGH LEV...
 
Noise Control of Vacuum Cleaners
Noise Control of Vacuum CleanersNoise Control of Vacuum Cleaners
Noise Control of Vacuum Cleaners
 
Comply
Comply Comply
Comply
 
Cost-effective Video Analytics in Smart Cities
Cost-effective Video Analytics in Smart CitiesCost-effective Video Analytics in Smart Cities
Cost-effective Video Analytics in Smart Cities
 
A novel approach towards a Smarter DSLR Camera
A novel approach towards a Smarter DSLR CameraA novel approach towards a Smarter DSLR Camera
A novel approach towards a Smarter DSLR Camera
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devices
 
Connected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian ScenarioConnected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian Scenario
 
A Sigh of Relief for Patients with Chronic Diseases
A Sigh of Relief for Patients with Chronic DiseasesA Sigh of Relief for Patients with Chronic Diseases
A Sigh of Relief for Patients with Chronic Diseases
 
Painting a Social & Mobile Picture in Real Time
Painting a Social & Mobile Picture in Real TimePainting a Social & Mobile Picture in Real Time
Painting a Social & Mobile Picture in Real Time
 
A Novel Design Approach for Electronic Equipment - FEA Based Methodology
A Novel Design Approach for Electronic Equipment - FEA Based MethodologyA Novel Design Approach for Electronic Equipment - FEA Based Methodology
A Novel Design Approach for Electronic Equipment - FEA Based Methodology
 
Intrusion Detection System (IDS)
Intrusion Detection System (IDS)Intrusion Detection System (IDS)
Intrusion Detection System (IDS)
 
Manufacturing Automation and Digitization
Manufacturing Automation and DigitizationManufacturing Automation and Digitization
Manufacturing Automation and Digitization
 
Managing Customer Care in Digital
Managing Customer Care in DigitalManaging Customer Care in Digital
Managing Customer Care in Digital
 
Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...
Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...
Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...
 
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...
 
Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...
Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...
Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...
 
Transform and Modernize -UK's leading specialists in Pension and Employee Ben...
Transform and Modernize -UK's leading specialists in Pension and Employee Ben...Transform and Modernize -UK's leading specialists in Pension and Employee Ben...
Transform and Modernize -UK's leading specialists in Pension and Employee Ben...
 

Último

TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSendBig4
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 

Último (20)

TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.com
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 

HCLT Brochure: HCL Information Security Services

  • 1. There is always an uncompromising element in every Business Integrated Operations Management Services Green Datacenter Managed Mainframe Services Services End User Cross Functional Computing Services Network Services Security Services We call it We call it SECURITY Industrialized IT Management Secured Systems | Compliant Processes Optimized | Flexible | Centralized & Standardized | Business Aligned www.hclisd.com www.hclisd.com
  • 2. Why Outsource Security Managed Security Services As enterprises grow, so does the requirement for global information exchange amongst employees, suppliers, partners and Services customers. However, as this information becomes more broadly distributed, threats to the confidentiality, integrity and availability of this information increase exponentially. The utmost negative impact of advancement of technology is an exponential increase in security threats such as Cyber threats, Malware infections, Phishing attacks, Web Application Attacks etc. All these security breaches may result in drastic revenue loss, legal liabilities, diminished productivity and brand erosion. It becomes imperative for Enterprises to look out for those partners, who can work with them to build up business aligned information security framework and improve the ROSI (Return on Security Investment). Service providers with end to end capability are becoming default choice HCL's Managed Security Services from four fully operational Security Operation centers (SOC) offer real-time protection to the for Enterprises. organizations, thereby reducing their risks in today's ever-changing security threat environment. Balanced approach, maintaining compliance, proactive security stance, technophobic to techno centric focus and flexible delivery model is what HCL managed security { { services offers to its customers across the globe. The service offering are bundled in a manner so as to take care of the entire security Security Risk operations of the customer's infrastructure environment Lack of Sharing risk { { Cost Measurement Services Security qualified with Trusted Optimization and Accountability Awareness experts Partners Management Improve security posture Ensure Business continuity and and compliance Reduce Operational effective Incident management cost adherence Managed Security Services HCL Information Security Security Solution Security Solution Managed Endpoint Services Portfolio Monitoring Management Security Services Anti-Phishing Anti-Malware (On-site / remote) (On-site / remote) HCL's Information Security Service portfolio has been designed to deliver strategic, financial & technical benefits to customers and SIEM based 4 Policy 4 Virus / malware 4 Proactive Domain & 4 Web application 4 take the customer organization to the desired state of the Information Security robustness. Event Management / spyware Phishing URLs Malware Monitoring & Monitoring Monitoring monitoring Analysis Change Mgmt 4 HCL's ability to meet the information security needs across industry verticals, with commitment of quality delivery and partnering Outbreak Prevention 4 Abuse Email 4 Web application 4 approach, has positioned HCL as a leader in this segment. HCL has a wide spectrum of service portfolio ranging from Consulting to Performance 4 Configuration 4 Forwarding malware Managed security services delivering maximum benefits at a reduced cost. Monitoring Mgmt 4 Updates Signatures 4 site Phishing web Malicious code 4 Incident Mgmt 4 Signature updates 4 4 Mgmt Compliance takedown sandbox analysis HCL Information Security Services Alert & 4 4 tuning Device fine Deviation reporting 4 4and Reporting Forensics & 4 Notification Forensics analysis Malware Version Upgrade 4 Uniform policy 4 reporting Info Sec Identity & Access Managed Security Professional & CXO Report 4 management Consulting Services Management Services Services SI Services Reporting 4 Compliance 4 Configuration 4 Security Compliance 4 4 and Architecture Security Incident 4 Solution Integration and 4 report management Consulting consulting Monitoring & Alerting implementation Security Design & 4 Access Management 4 Service (on-site / remote) 4 support OEM product Architecture Solution Security Infrastructure 4 4 and Tech refresh Security Audit & 4 Identity Management 4 Mgmt migration Standard Solutions Covered Other Devices / Systems Assessment Solution 4 Assessment Vulnerability 4 design Date Center Vulnerability 4 Identity auditing 4 Anti Phishing Service 4 Routers 4 4Unix / Wintel Systems – 4 design Captive SOC Assessment Directory Service Anti Malware Service 4 4 Project Management 4 4 threat mgmt) UTM (unified 4 Applications Web Servers 4 Test Penetration Authentication Service 4 Managed Endpoint 4 Product Evaluation Security policy & process 4 Security Services 4 Firewall 4 Database Servers 4 Implementation & 4 On-site Support Service consulting Integration Managed authentication 4 VPN 4 IAM Solution 4 4 Log Management Security roadmap 4 Managed IAM service service & framework consulting 4 4 / appliance Proxy Server AAA Servers 4 4 Monitoring & Transaction Security Event Analysis Roadmap Assessment 4 NIDS/NIPS Anti Virus Analysis 4 Framework 4 OEM evaluation 4 4Service OEM ROS 4 AV/Host HIDS/Host VA Scanners 4 Firewalls Unified Visibility Portal Mainframe 4 HCL Center of Service Excellence End point security solution 4 Content Filters 4 Proof of Concept Lab Solution Engineering Service Engineering NAC / NAP 4 E-mail security 4 4 Leak DLP (Data Banking & Preventions) Patch Management 4 Life Science Manufacturing & Hi-Tech Govt. & Financial & HealthCare Retail Engineering Telecom Services Distribution Defense Encryption 4
  • 3. Why Outsource Security Managed Security Services As enterprises grow, so does the requirement for global information exchange amongst employees, suppliers, partners and Services customers. However, as this information becomes more broadly distributed, threats to the confidentiality, integrity and availability of this information increase exponentially. The utmost negative impact of advancement of technology is an exponential increase in security threats such as Cyber threats, Malware infections, Phishing attacks, Web Application Attacks etc. All these security breaches may result in drastic revenue loss, legal liabilities, diminished productivity and brand erosion. It becomes imperative for Enterprises to look out for those partners, who can work with them to build up business aligned information security framework and improve the ROSI (Return on Security Investment). Service providers with end to end capability are becoming default choice HCL's Managed Security Services from four fully operational Security Operation centers (SOC) offer real-time protection to the for Enterprises. organizations, thereby reducing their risks in today's ever-changing security threat environment. Balanced approach, maintaining compliance, proactive security stance, technophobic to techno centric focus and flexible delivery model is what HCL managed security { { services offers to its customers across the globe. The service offering are bundled in a manner so as to take care of the entire security Security Risk operations of the customer's infrastructure environment Lack of Sharing risk { { Cost Measurement Services Security qualified with Trusted Optimization and Accountability Awareness experts Partners Management Improve security posture Ensure Business continuity and and compliance Reduce Operational effective Incident management cost adherence Managed Security Services HCL Information Security Security Solution Security Solution Managed Endpoint Services Portfolio Monitoring Management Security Services Anti-Phishing Anti-Malware (On-site / remote) (On-site / remote) HCL's Information Security Service portfolio has been designed to deliver strategic, financial & technical benefits to customers and SIEM based 4 Policy 4 Virus / malware 4 Proactive Domain & 4 Web application 4 take the customer organization to the desired state of the Information Security robustness. Event Management / spyware Phishing URLs Malware Monitoring & Monitoring Monitoring monitoring Analysis Change Mgmt 4 HCL's ability to meet the information security needs across industry verticals, with commitment of quality delivery and partnering Outbreak Prevention 4 Abuse Email 4 Web application 4 approach, has positioned HCL as a leader in this segment. HCL has a wide spectrum of service portfolio ranging from Consulting to Performance 4 Configuration 4 Forwarding malware Managed security services delivering maximum benefits at a reduced cost. Monitoring Mgmt 4 Updates Signatures 4 site Phishing web Malicious code 4 Incident Mgmt 4 Signature updates 4 4 Mgmt Compliance takedown sandbox analysis HCL Information Security Services Alert & 4 4 tuning Device fine Deviation reporting 4 4and Reporting Forensics & 4 Notification Forensics analysis Malware Version Upgrade 4 Uniform policy 4 reporting Info Sec Identity & Access Managed Security Professional & CXO Report 4 management Consulting Services Management Services Services SI Services Reporting 4 Compliance 4 Configuration 4 Security Compliance 4 4 and Architecture Security Incident 4 Solution Integration and 4 report management Consulting consulting Monitoring & Alerting implementation Security Design & 4 Access Management 4 Service (on-site / remote) 4 support OEM product Architecture Solution Security Infrastructure 4 4 and Tech refresh Security Audit & 4 Identity Management 4 Mgmt migration Standard Solutions Covered Other Devices / Systems Assessment Solution 4 Assessment Vulnerability 4 design Date Center Vulnerability 4 Identity auditing 4 Anti Phishing Service 4 Routers 4 4Unix / Wintel Systems – 4 design Captive SOC Assessment Directory Service Anti Malware Service 4 4 Project Management 4 4 threat mgmt) UTM (unified 4 Applications Web Servers 4 Test Penetration Authentication Service 4 Managed Endpoint 4 Product Evaluation Security policy & process 4 Security Services 4 Firewall 4 Database Servers 4 Implementation & 4 On-site Support Service consulting Integration Managed authentication 4 VPN 4 IAM Solution 4 4 Log Management Security roadmap 4 Managed IAM service service & framework consulting 4 4 / appliance Proxy Server AAA Servers 4 4 Monitoring & Transaction Security Event Analysis Roadmap Assessment 4 NIDS/NIPS Anti Virus Analysis 4 Framework 4 OEM evaluation 4 4Service OEM ROS 4 AV/Host HIDS/Host VA Scanners 4 Firewalls Unified Visibility Portal Mainframe 4 HCL Center of Service Excellence End point security solution 4 Content Filters 4 Proof of Concept Lab Solution Engineering Service Engineering NAC / NAP 4 E-mail security 4 4 Leak DLP (Data Banking & Preventions) Patch Management 4 Life Science Manufacturing & Hi-Tech Govt. & Financial & HealthCare Retail Engineering Telecom Services Distribution Defense Encryption 4
  • 4. Information Security Identity & Access Management Service Offerings Consulting Services HCL's decade old Information Security Consulting practice helps its customers across the globe to identify, evaluate, and improve HCL's Identity and Access Management Practice provides increased focus to secure the organization and protect confidential and overall security posture of enterprise. These services are based on widely accepted recognized standards and best practices, and are personal data with a comprehensive and focused approach combined with robust solutions and services. oriented to the unique need of organizations. A team of certified security consultants who has rich experience in security domain helps organization in building a strong security After a detailed analysis of customer's requirements and expectations, HCL has aligned its Identity and Access Management posture that helps reduce costs, improve service, and manage risk. Service offerings in Horizontal and Vertical layers as shown below. The intention of this model is to bind together the horizontal and vertical layers (each offering its own specialized services) seamlessly to drive an end to end Identity and Access Management Information Security Consulting, Design and Assessment Service program. Security Identity Access Privileged Identity Authentication Security Design & Security Audit & Compliance & Management Management Identity Governance Services Architecture Services Assessment Services Consulting Services Services Services Services Services 4 Security Enterprise 4 Approved PCI Council PCI-DSS Consulting and 4 Roadmap Scanning Service (ASV) Certification Service Integration Identity Life 4 Web Access 4 Privileged 4 Role 4 Multi Factor 4 4 Security Enterprise Wireless Security 4 Cycle Management Remote Access Engineering Authentication ISO 27001:2005 Consulting and 4 Roadmap Consulting Assessment Services Management and Modeling Implementation Service Data Centre 4 Industry Vertical aligned 4 4 Security Policy Information Architecture Design Security Assessment and Process Consulting M & A Consulting for 4 4 Security Audit Information Directory Access 4 Enterprise 4 Privileged 4 SoD 4 Adaptive 4 DLP Consulting 4 Security re-architecture and Gap Analysis Provisioning Session Compliance Authentication Services Single Sign On 4 Consulting Services Anti-Fraud Management Vertical Aligned 4 4 Assessment & Vulnerability Security Design Penetration Test Apps 4 Security Application Services Security Assessment Consulting Compliance, 4 Role Centralized Web Single 4 Privileged 4 Identity 4 Out Of Band 4 Auditing & Management Sign On Single Sign On Assurance Authentication Reporting & Attestations Professional Services Auditing & 4 4 & Entitlement HCL adopts a phased approach for professional services and offer clients a comprehensive information security lifecycle service, Migration Work Flow 4 Federation 4 Reporting of Access Authentication 4 Design and Service Brokerage through every stage of any transformation initiative. The key differentiator in the engagement approach is that it works with the Services Implementation Privileged Certification customer as their partner in their business aligned Information Security program and not just as the reseller or an external service Session provider. This highly skilled and niche service portfolio, encompass the design, development and deployment of solutions and services that secure organization's information assets and infrastructure.HCL specializes in creating secure enterprise architectures, providing Development Role Based 4 Managed 4 the strategies and enablers that secure entire IT framework of any organization from any industry vertical. Services Access Control Authentication Services Security Professional & SI Services Solution Design & Project Product Evaluation Sustenance Service Advisory OS Access 4 Integration Management & Testing Control Services Solution design & 4 Project planning 4 Business requirement 4 Device Management 4 implementation assessment Project 4 Periodic maintenance 4 Solution Integration 4 management 4 evaluation Technology with other 4 update Upgrade & components 4 vendor Third party Vendor evaluation 4 coordination Configuration 4 Technical refresh 4 Product mapping 4 management OEM coordination 4 Migration service 4 Solution specification 4 Problem management 4 M&A planning and 4 mapping Captive setup 4 execution Change management 4 design Product UAT 4 Project governance 4 Vendor management 4 4and DC design and management On-site facility 4 implementation management
  • 5. Information Security Identity & Access Management Service Offerings Consulting Services HCL's decade old Information Security Consulting practice helps its customers across the globe to identify, evaluate, and improve HCL's Identity and Access Management Practice provides increased focus to secure the organization and protect confidential and overall security posture of enterprise. These services are based on widely accepted recognized standards and best practices, and are personal data with a comprehensive and focused approach combined with robust solutions and services. oriented to the unique need of organizations. A team of certified security consultants who has rich experience in security domain helps organization in building a strong security After a detailed analysis of customer's requirements and expectations, HCL has aligned its Identity and Access Management posture that helps reduce costs, improve service, and manage risk. Service offerings in Horizontal and Vertical layers as shown below. The intention of this model is to bind together the horizontal and vertical layers (each offering its own specialized services) seamlessly to drive an end to end Identity and Access Management Information Security Consulting, Design and Assessment Service program. Security Identity Access Privileged Identity Authentication Security Design & Security Audit & Compliance & Management Management Identity Governance Services Architecture Services Assessment Services Consulting Services Services Services Services Services 4 Security Enterprise 4 Approved PCI Council PCI-DSS Consulting and 4 Roadmap Scanning Service (ASV) Certification Service Integration Identity Life 4 Web Access 4 Privileged 4 Role 4 Multi Factor 4 4 Security Enterprise Wireless Security 4 Cycle Management Remote Access Engineering Authentication ISO 27001:2005 Consulting and 4 Roadmap Consulting Assessment Services Management and Modeling Implementation Service Data Centre 4 Industry Vertical aligned 4 4 Security Policy Information Architecture Design Security Assessment and Process Consulting M & A Consulting for 4 4 Security Audit Information Directory Access 4 Enterprise 4 Privileged 4 SoD 4 Adaptive 4 DLP Consulting 4 Security re-architecture and Gap Analysis Provisioning Session Compliance Authentication Services Single Sign On 4 Consulting Services Anti-Fraud Management Vertical Aligned 4 4 Assessment & Vulnerability Security Design Penetration Test Apps 4 Security Application Services Security Assessment Consulting Compliance, 4 Role Centralized Web Single 4 Privileged 4 Identity 4 Out Of Band 4 Auditing & Management Sign On Single Sign On Assurance Authentication Reporting & Attestations Professional Services Auditing & 4 4 & Entitlement HCL adopts a phased approach for professional services and offer clients a comprehensive information security lifecycle service, Migration Work Flow 4 Federation 4 Reporting of Access Authentication 4 Design and Service Brokerage through every stage of any transformation initiative. The key differentiator in the engagement approach is that it works with the Services Implementation Privileged Certification customer as their partner in their business aligned Information Security program and not just as the reseller or an external service Session provider. This highly skilled and niche service portfolio, encompass the design, development and deployment of solutions and services that secure organization's information assets and infrastructure.HCL specializes in creating secure enterprise architectures, providing Development Role Based 4 Managed 4 the strategies and enablers that secure entire IT framework of any organization from any industry vertical. Services Access Control Authentication Services Security Professional & SI Services Solution Design & Project Product Evaluation Sustenance Service Advisory OS Access 4 Integration Management & Testing Control Services Solution design & 4 Project planning 4 Business requirement 4 Device Management 4 implementation assessment Project 4 Periodic maintenance 4 Solution Integration 4 management 4 evaluation Technology with other 4 update Upgrade & components 4 vendor Third party Vendor evaluation 4 coordination Configuration 4 Technical refresh 4 Product mapping 4 management OEM coordination 4 Migration service 4 Solution specification 4 Problem management 4 M&A planning and 4 mapping Captive setup 4 execution Change management 4 design Product UAT 4 Project governance 4 Vendor management 4 4and DC design and management On-site facility 4 implementation management
  • 6. Why HCL ? Partner & Analysts Speak Highlighted amongst top security service providers with Differentiator Benefits to Customers FORRESTER security ecosystem built on technology partners & service { { Capability to address end-to-end Spectrum of Security Services and Coverage ability to address Information One Partner who can help in building business/industry vertical aligned Authorized Scanning Vendor (ASV) Security Life-cycle need for Information Security Framework by PCI Council Since 2005 enterprises from any industry vertical { { Rated "Positive" MSSP in Europe Expertise on Tap, across the breadth Large Pool of Security Resources of information security domain. No People need to retain costly security SMEs in the role. Cisco Masters Certification "First Organization in ASPAC Region” Innovation { Dedicated HCL innovation centre provides POC, technology refresh & optimization process Lower investments on new Technology { Cert-In Empanelled IT Security Audit Organization Rated No. 1 Security Services Provider in India Technology { Diversified technological partnerships with All security vendors Experience and Capability to handle complex multi-vendor and heterogeneous client environments { Cost { HCL offers world class security service to improve customer's ROSI (Return on Security Investment) Reduce operation cost, hassle free handling of domain experts, no effect of attrition, increase efficiency and profitability { Customers Spe k Appreciation from Cyril Moneron, CISO, World's leading Glass Manufacturer: “I would like to congratulate the project Appreciation from Fortune 500 Energy & Utilities Organization: “I have managed security teams from 5 to 250 over the Security Consulting team received appreciation from senior management of Leading PSU bank in India: “ We are { { team... thanks to the commitment & the past 29 years, both physical and happy with the way you have been professionalism of all team members. electronic, and happy to let you know you coordinating various security And extensively, a very good support rank among the best. Your dedication to consultancy and audit activities to from HCL Management” work, commitment to the Oncor security address our bank’s assignments and Large enterprise clients for Experience through leadership and mission and to Oncor Electric Delivery is priorities. Audit findings and guidance Experience greatly appreciated.. JD” given to the Bank has been very useful Information Security Services availability of large knowledge base and timely.” Process { HCL follows a Defined & mature Operational Processes Customer can leverage HCL's process consultants to define and continuously improve delivery processes {