SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
Symantec™ Cyber Security Services
Security monitoring, correlation and analysis by GIAC certified experts
Data Sheet: Symantec Cyber Security: Managed Services
Overview
Symantec™ Cyber Security Services: Managed Security
Services minimize the potential business impact of
increasingly sophisticated and targeted attacks by reducing
the time it takes to detect, assess and respond to security
incidents.
MSS provides proven security expertise, log retention, and
real-time monitoring of network security devices and endpoint
protection solutions. Partnering with Symantec—an industry
leader in managed security services for over twelve
years—you can build on existing investments in security
technologies to create an effective, scalable information
security program to improve your security posture.
Improved threat visibility with "edge to endpoint" coverage
Your IT environment is continually evolving with new devices
and applications— and each new technology represents
a separate avenue of attack. Our comprehensive “edge to
endpoint” approach identifies and correlates threats for not
only network devices, but also includes servers, endpoints,
and other IT assets. This enterprise-wide perspective gives us
unique insight into your network and allows us to quickly
identify emerging threats.
LLeverage Global Threat Intelligenceeverage Global Threat Intelligence
MSS integrates threat intelligence from Symantec’s industry
leading Global Intelligence Network (GIN) to provide
unparalleled visibility of the evolving threat landscape to
identify and block new and emerging threats. With more than
64.6 million sensors monitoring worldwide attack activity, the
GIN provides timely, relevant, actionable intelligence about
emerging threats, threat sources and vulnerabilities.
Actionable alerts, prioritizActionable alerts, prioritized by business risked by business risk
Faced with a continuous deluge of security log and alert data,
it can be difficult to cut through the noise to focus on the
threats that matter most to your organization. MSS helps
assess the business impact of threats by consolidating log and
alert data from across your enterprise, then incorporating
business context data such as asset value, organization,
system function, and compliance restrictions to provide a
prioritized list of actionable security incidents.
Security experts to protect your enterprise
Detecting known and emerging threats not only requires
advanced technology, it also requires highly specialized
security expertise to decipher complex attack patterns
associated with malicious activity. Symantec offers quick
time-to-value by providing in-region GIAC certified analysts
who deeply engage with your team to understand your
environment and internal processes as well as provide
guidance regarding incident response. Your local team is
backed by over 1000 security analysts and research
professionals in five Security Operations Centers and 11
Security Response Centers around the world.
1
Flexible, Scalable Security Monitoring
Whether you're just beginning to identify requirements or are
outsourcing security monitoring for a multi-national
organization, Symantec Managed Security Services offer the
scalablity needed to meet your current requirements—and
grow with your security program over time.
Symantec offers two pricing models:
• Our device-based option provides the flexibility to mix-and-
match device monitoring to meet your initial requirements,
then extend to additional technologies as your security
program evolves.
• Our enterprise-wide option is based on enterprise size to
help ensure predictable, fixed costs.
We also provide three levels of service to help ensure the right
solution for your needs.
Symantec Hosted Log Retention
Symantec Hosted Log Retention Service provides enterprise-
wide log collection, storage, reporting, and querying delivered
through a hosted, resilient, and secure environment. Features
include:
• Enterprise-wide log collection.
• Hosted log storage in a secure and highly available facility.
• Log collection and retention reporting to help support
regulatory compliance requirements.
• Association of logs with security incidents to provide
supporting context for incident analysis.
• In-the-cloud online storage for 3 months, offline storage
for one year.
• A secure web portal to enable flexible and real-time online
log queries.
Symantec Essential Security Monitoring
Symantec Essential Security Monitoring Service provides
enterprise-wide security analysis to identify threats. It
includes all the features of Log Retention Service, plus:
• Real-time security incident monitoring to detect threats
and enable an effective response.
• Association of asset information with incident details to
provide context and enable prioritized response.
• Analysis incorporates Symantec™ Global Intelligence
Network threat intelligence to identify new and emerging
threats.
• Association of asset information with incident details to
provide context and enable prioritized response.
• Round the clock coverage from a global network of
Symantec SOCs.
• Access to GIAC-certified security analysts to assist with
incident remediation.
• A single view of all incidents and reports through a secure
web portal.
• Security incident reporting to support regulatory
compliance requirements.
Symantec Advanced Threat Protection
Symantec Advanced Security Monitoring Service provides
enterprise-wide, intelligence-driven security analysis to
identify known and emerging threats to critical infrastructure.
It works seamlessly with Hosted Log Retention and includes
all the features of Essential Security Monitoring, plus:
• Advanced Threat Protection to automatically correlate
network and endpoint security detections with external
threat intelligence to detect, assess and respond
to unknown and zero day malware
• Anomalous traffic detection utilizing powerful data mining
and statistical analysis to identify hard-to-find malicious
traffic.
Data Sheet: Symantec Cyber Security: Managed Services
Symantec™ Cyber Security Services
2
Summary
Security Monitoring Services reduces overall security and
business risk through real-time log management and security
monitoring at a predictable cost structure that facilitates
operational planning. With our unique “edge to endpoint”
coverage to improve your security visibility, our enterprise-
wide pricing model to easily adjust to changes in your
infrastructure, and our flexible mix and match service
portfolio, you can design a security monitoring solution to
meet both your security and financial goals. As new threats
emerge, you can be confident you are protected with
Symantec Managed Security Services.
ComplementarComplementary Sery Services:vices:
SSymantec™ Cymantec™ Cyber Securityber Security:y: MSS-AdvMSS-Advanced Threatanced Threat
ProProtectiontection provides bi-directional integration between
endpoint security and network security vendors enabling
users to rapidly and effectively contain, investigate and
remediate unknown and zero day attacks that evade
traditional security technologies.
SSymantec™ Cymantec™ Cyber Securityber Security:y: Intrusion DetectionIntrusion Detection/Pro/Protectiontection
Solution with SourcefireSolution with Sourcefire®® provides a complete, managed IDP
solution combining both hardware and software, fully
supported by Symantec Managed Security Services.
SSymantec™ Cymantec™ Cyber Securityber Security:y: DeepSight™ IntelligenceDeepSight™ Intelligence
employs one of the industry’s largest threat collection
networks to deliver a comprehensive range of timely threat
intelligence through a customizable portal or datafeeds,
enabling proactive actions and effective incident response.
DeepSight™ covers topics including threat actors, tools,
techniques, and processes, campaigns, and vulnerabilities,
and the managed adversary and threat intelligence delivers
insight into the actions of actors, enabling focus on threats of
the greatest importance.
SSymantec™ Cymantec™ Cyber Securityber Security: Incident Responsey: Incident Response provides on-
site investigation support to help organizations mitigate the
impact of an attack or outbreak and restore business as usual.
Symantec draws from deep skills and years of experience to
help you resolve incidents, return to normal operations, and
prevent incident recurrence while minimizing the impact on
your organization.
For More Information:
Visit our website
http://enterprise.symantec.com
http://go.symantec.com/mss
To speak with a Product Specialist in the U.S.
Call toll-free 1 (800) 466-5875
To speak with a Product Specialist outside the U.S.
For specific country offices and contact numbers, please visit
our website.
About Symantec
Symantec is a global leader in providing security, storage, and
systems management solutions to help consumers and
organizations secure and manage their information-driven
world. Our software and services protect against more risks at
more points, more completely and efficiently, enabling
confidence wherever information is used or stored.
Headquartered in Mountain View, Calif., Symantec has
operations in 40 countries. More information is available at
www.symantec.com.
Symantec World Headquarters
350 Ellis St.
Mountain View, CA 94043 USA
+1 (650) 527 8000
1 (800) 721 3934
www.symantec.com
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S.
and other countries. Other names may be trademarks of their respective owners.
21042033-2 07/14
Data Sheet: Symantec Cyber Security: Managed Services
Symantec™ Cyber Security Services
3

Mais conteúdo relacionado

Mais de Symantec

Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantSymantec
 
Symantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec
 
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...Symantec
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec
 

Mais de Symantec (20)

Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators Want
 
Symantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 Webinar
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
 
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
 

Último

PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServiceRenan Moreira de Oliveira
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxYounusS2
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum ComputingGDSC PJATK
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceMartin Humpolec
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataSafe Software
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncObject Automation
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 

Último (20)

PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your Salesforce
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation Inc
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 

DATASHEET ▶ Symantec Cyber Security Services: Security monitoring, correlation and analysis by GIAC certified experts

  • 1. Symantec™ Cyber Security Services Security monitoring, correlation and analysis by GIAC certified experts Data Sheet: Symantec Cyber Security: Managed Services Overview Symantec™ Cyber Security Services: Managed Security Services minimize the potential business impact of increasingly sophisticated and targeted attacks by reducing the time it takes to detect, assess and respond to security incidents. MSS provides proven security expertise, log retention, and real-time monitoring of network security devices and endpoint protection solutions. Partnering with Symantec—an industry leader in managed security services for over twelve years—you can build on existing investments in security technologies to create an effective, scalable information security program to improve your security posture. Improved threat visibility with "edge to endpoint" coverage Your IT environment is continually evolving with new devices and applications— and each new technology represents a separate avenue of attack. Our comprehensive “edge to endpoint” approach identifies and correlates threats for not only network devices, but also includes servers, endpoints, and other IT assets. This enterprise-wide perspective gives us unique insight into your network and allows us to quickly identify emerging threats. LLeverage Global Threat Intelligenceeverage Global Threat Intelligence MSS integrates threat intelligence from Symantec’s industry leading Global Intelligence Network (GIN) to provide unparalleled visibility of the evolving threat landscape to identify and block new and emerging threats. With more than 64.6 million sensors monitoring worldwide attack activity, the GIN provides timely, relevant, actionable intelligence about emerging threats, threat sources and vulnerabilities. Actionable alerts, prioritizActionable alerts, prioritized by business risked by business risk Faced with a continuous deluge of security log and alert data, it can be difficult to cut through the noise to focus on the threats that matter most to your organization. MSS helps assess the business impact of threats by consolidating log and alert data from across your enterprise, then incorporating business context data such as asset value, organization, system function, and compliance restrictions to provide a prioritized list of actionable security incidents. Security experts to protect your enterprise Detecting known and emerging threats not only requires advanced technology, it also requires highly specialized security expertise to decipher complex attack patterns associated with malicious activity. Symantec offers quick time-to-value by providing in-region GIAC certified analysts who deeply engage with your team to understand your environment and internal processes as well as provide guidance regarding incident response. Your local team is backed by over 1000 security analysts and research professionals in five Security Operations Centers and 11 Security Response Centers around the world. 1
  • 2. Flexible, Scalable Security Monitoring Whether you're just beginning to identify requirements or are outsourcing security monitoring for a multi-national organization, Symantec Managed Security Services offer the scalablity needed to meet your current requirements—and grow with your security program over time. Symantec offers two pricing models: • Our device-based option provides the flexibility to mix-and- match device monitoring to meet your initial requirements, then extend to additional technologies as your security program evolves. • Our enterprise-wide option is based on enterprise size to help ensure predictable, fixed costs. We also provide three levels of service to help ensure the right solution for your needs. Symantec Hosted Log Retention Symantec Hosted Log Retention Service provides enterprise- wide log collection, storage, reporting, and querying delivered through a hosted, resilient, and secure environment. Features include: • Enterprise-wide log collection. • Hosted log storage in a secure and highly available facility. • Log collection and retention reporting to help support regulatory compliance requirements. • Association of logs with security incidents to provide supporting context for incident analysis. • In-the-cloud online storage for 3 months, offline storage for one year. • A secure web portal to enable flexible and real-time online log queries. Symantec Essential Security Monitoring Symantec Essential Security Monitoring Service provides enterprise-wide security analysis to identify threats. It includes all the features of Log Retention Service, plus: • Real-time security incident monitoring to detect threats and enable an effective response. • Association of asset information with incident details to provide context and enable prioritized response. • Analysis incorporates Symantec™ Global Intelligence Network threat intelligence to identify new and emerging threats. • Association of asset information with incident details to provide context and enable prioritized response. • Round the clock coverage from a global network of Symantec SOCs. • Access to GIAC-certified security analysts to assist with incident remediation. • A single view of all incidents and reports through a secure web portal. • Security incident reporting to support regulatory compliance requirements. Symantec Advanced Threat Protection Symantec Advanced Security Monitoring Service provides enterprise-wide, intelligence-driven security analysis to identify known and emerging threats to critical infrastructure. It works seamlessly with Hosted Log Retention and includes all the features of Essential Security Monitoring, plus: • Advanced Threat Protection to automatically correlate network and endpoint security detections with external threat intelligence to detect, assess and respond to unknown and zero day malware • Anomalous traffic detection utilizing powerful data mining and statistical analysis to identify hard-to-find malicious traffic. Data Sheet: Symantec Cyber Security: Managed Services Symantec™ Cyber Security Services 2
  • 3. Summary Security Monitoring Services reduces overall security and business risk through real-time log management and security monitoring at a predictable cost structure that facilitates operational planning. With our unique “edge to endpoint” coverage to improve your security visibility, our enterprise- wide pricing model to easily adjust to changes in your infrastructure, and our flexible mix and match service portfolio, you can design a security monitoring solution to meet both your security and financial goals. As new threats emerge, you can be confident you are protected with Symantec Managed Security Services. ComplementarComplementary Sery Services:vices: SSymantec™ Cymantec™ Cyber Securityber Security:y: MSS-AdvMSS-Advanced Threatanced Threat ProProtectiontection provides bi-directional integration between endpoint security and network security vendors enabling users to rapidly and effectively contain, investigate and remediate unknown and zero day attacks that evade traditional security technologies. SSymantec™ Cymantec™ Cyber Securityber Security:y: Intrusion DetectionIntrusion Detection/Pro/Protectiontection Solution with SourcefireSolution with Sourcefire®® provides a complete, managed IDP solution combining both hardware and software, fully supported by Symantec Managed Security Services. SSymantec™ Cymantec™ Cyber Securityber Security:y: DeepSight™ IntelligenceDeepSight™ Intelligence employs one of the industry’s largest threat collection networks to deliver a comprehensive range of timely threat intelligence through a customizable portal or datafeeds, enabling proactive actions and effective incident response. DeepSight™ covers topics including threat actors, tools, techniques, and processes, campaigns, and vulnerabilities, and the managed adversary and threat intelligence delivers insight into the actions of actors, enabling focus on threats of the greatest importance. SSymantec™ Cymantec™ Cyber Securityber Security: Incident Responsey: Incident Response provides on- site investigation support to help organizations mitigate the impact of an attack or outbreak and restore business as usual. Symantec draws from deep skills and years of experience to help you resolve incidents, return to normal operations, and prevent incident recurrence while minimizing the impact on your organization. For More Information: Visit our website http://enterprise.symantec.com http://go.symantec.com/mss To speak with a Product Specialist in the U.S. Call toll-free 1 (800) 466-5875 To speak with a Product Specialist outside the U.S. For specific country offices and contact numbers, please visit our website. About Symantec Symantec is a global leader in providing security, storage, and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Headquartered in Mountain View, Calif., Symantec has operations in 40 countries. More information is available at www.symantec.com. Symantec World Headquarters 350 Ellis St. Mountain View, CA 94043 USA +1 (650) 527 8000 1 (800) 721 3934 www.symantec.com Copyright © 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 21042033-2 07/14 Data Sheet: Symantec Cyber Security: Managed Services Symantec™ Cyber Security Services 3