The document discusses managed security services offered by ESDS including security operations centers (SOC) that provide monitoring, analytics, and incident response. It describes three SOC solutions - Eagle Eye for monitoring, Security Insight for assessments, and Total Secure for integrated services. The document also overview eNlight web application firewall and web VPN solutions, highlighting their features such as protecting against OWASP threats and providing granular access control. It argues that managed security services can enhance organizations' security posture through monitoring, alerting and rapid deployment capabilities.
3. About ESDS
• Born with a global mind-set, ESDS began its operations
from the Tier 2 city of Nashik (India) in 2005 and
presently has its footprint in 19 nations across APAC,
Europe, Middle East, the Americas and Africa. ESDS acts
as a catalyst for digital transformation in the modern
outcome-based economy by enabling organizations to
embrace advanced technologies.
• At ESDS, we believe in creating lifetime relationships
and fostering a culture of co-existence by uniting
minds that are passionate about delivering innovative
solutions and exuberant customer experience. More than
750 organizations, backed by a committed workforce at
ESDS, have successfully achieved their business
5. Cyber Security in Indian
Scenario-
A Snapshot
78% Companies with
no Cyber incident
response plan
74% BFSI Sector is a
Top Target
63% attacks amounted
to financial loss
8. Growing Importance of SOC
• Determines the complete security (Cyber, digital &
information security) team functionality of any
business organization=on
• Responsible for assessment and implementation of the
security posture for an organization
• Deploying and managing layers of security with the aim
of protecting valuable data of an organization
• SOC-as-a-Service helps the companies to distinguish
real threats and act on these problems with higher
focus and urgency
9. Growing Importance of SOC
(Cont.…)
• Involves components like- infrastructure, process,
people, and other devices for converting and reactive
monitoring, assessment, testing along remediation for
all threats- potential as well as actual
• Includes constant knowledge, skill and system for
pulling out potential threats from large data volumes
collected & analysed
• Companies working on huge networks collect huge
critical data logs. All these require advanced SOC-as-
a-Service
10. SOC Services
(Eagle Eye Services)
• Data aggregation
• Correlation and security monitoring
• Analytics
• Alerting
• Dashboards
• Compliance
• Log Retention (1 Month)
• Incident response
• Defining different reports and sending monthly reports
of all security incidents.
• Monitoring different events on 24*7 basis.
• Threat Intelligence
• User Behaviour & Event Analytics
• Machine Learning
• Real time Threat Hunting & detection
• Intimating customers about security risk and incidents
and suggesting require actions.
• Studying and Reporting anomalies
SOC Eagle Eye
Services
Data
Aggregation
Correlation
& Security
Monitoring
Alerting &
Incident
Response
User
Behaviour &
Event
Analytics
Threat
Intelligence
/Machine
Learning
Reporting/
Compliances
11. SOC Services
(Security Insight Services)
Security Posture Analysis
• Understanding roles and responsibilities
• System and Network architecture study
• Planning deployment techniques
Security Incident & Threat Analysis
• Integration with monitoring Services
• Devices traffic Monitoring
• Network flow analyzer
• Traffic analysis and reporting
• Network Flow Assessment
• Database Activity Assessment
• Application Performance Assessment
• Performing Vulnerability scans
• Review Application system @ client IT environment
• Monitoring, logging, Reporting
SOC Security
Insight Services
Security
Assessment
Application/
DB Testing-
Assessment
Email &
Wireless
Assessment
Gap Analysis
SIEM
Effectiveness
Modeling
Reports &
Recommend
ation
12. SOC Services
(Total Secure Services)
• All Security Eagle Eye &
Insight services
deliverables
• Proactive Remediation of
Security incidents with
Customer in Loop
• Onsite availability of
ESDS Security expert at
critical security issues
on resolution advisory
• Periodic client visit of
ESDS Security expert for
verifying security
SOC
Total Secure
Sevices
Security
Incident
Monitoring
Overall
Security
Assessments
Database/
Application
Monitoring
Addon
Services/
Email/
DLP/Wireless
Security
UBEA /Threat
Intelligence/
ML
Proactive
Remediation/
Onsite
Availability
14. Overview
• A software solution designed for protecting web
applications from threats and attacks
• Enterprises are using several public facing
applications
• Detects and prevents OWASP TOP-10 Threats
18. Features of eNlight WebVPN
Supports Windows, MAC, Linux and mobile OS
Supports for HTML5 applications,
Websocket,
RDP, FTP protocols, CGI applicationsIntegrate with multiple identity
providers simultaneously(AD, LDAP,
Radius etc.)Multifactor authentication with SMS and
Email OTP
Time based OTP with Google and Microsoft
Authenticator
WAF protects from OWASP Top 10
Vulnerabilities
Granular Application Access Control
19. Benefits of eNlight WebVPN
Anywhere
Accessibility
Anywhere
Deployment
Authorization &
Protection
Interoperability
Across all
desktop OS,
Browsers & Mobile
Devices
Deployment on
Public, on-
Premise or hybrid
cloud for private
secured access
Integrate with
any identity
providers to
authenticate
users
ML capability for
20. eNlight Web VPN v/s
Legacy VPN
eNlight Web VPN Legacy VPN
• Clientless WebVPN • Client or Agent Based
• More secure- giving access to only
applications
• Less secure- gives access to complete
network
• Cost-effective solution • High Cost
• Granular access control • Fixed access control
• Don’t need to reconnect when Internet
network changes
• Need to reconnect in case of Internet
network changes
• Easy to deploy and use • Complex deployment and usage
• Scalable and HA • Less scalable and HA
• Includes WAF and OWASP Top-10
Vulnerabilities
• WAF and other security features not
available
21. Thus, for any organization managed security services play an
important role in enhancing the security posture, alerting
against top vulnerabilities along with rapid and anywhere
deployment.
If you’re interested to leverage any of the mentioned managed
security services in your organization,
feel free to reach
Team ESDS throughhttps://esds.co.in/ 1800 209 3006relationship@esds.co.in
Concluding Remarks