SlideShare a Scribd company logo
1 of 21
Managed Security Services
An ESDS Offering
Company Overview
About ESDS
• Born with a global mind-set, ESDS began its operations
from the Tier 2 city of Nashik (India) in 2005 and
presently has its footprint in 19 nations across APAC,
Europe, Middle East, the Americas and Africa. ESDS acts
as a catalyst for digital transformation in the modern
outcome-based economy by enabling organizations to
embrace advanced technologies.
• At ESDS, we believe in creating lifetime relationships
and fostering a culture of co-existence by uniting
minds that are passionate about delivering innovative
solutions and exuberant customer experience. More than
750 organizations, backed by a committed workforce at
ESDS, have successfully achieved their business
Common Cyber Security Threats
Globally
Cyber Security in Indian
Scenario-
A Snapshot
78% Companies with
no Cyber incident
response plan
74% BFSI Sector is a
Top Target
63% attacks amounted
to financial loss
SOC Solutions
Eagle Eye Services
Security Insight
Services
SOC
SOLUTIONS
Total Secure Services
SOC Solutions
Growing Importance of SOC
• Determines the complete security (Cyber, digital &
information security) team functionality of any
business organization=on
• Responsible for assessment and implementation of the
security posture for an organization
• Deploying and managing layers of security with the aim
of protecting valuable data of an organization
• SOC-as-a-Service helps the companies to distinguish
real threats and act on these problems with higher
focus and urgency
Growing Importance of SOC
(Cont.…)
• Involves components like- infrastructure, process,
people, and other devices for converting and reactive
monitoring, assessment, testing along remediation for
all threats- potential as well as actual
• Includes constant knowledge, skill and system for
pulling out potential threats from large data volumes
collected & analysed
• Companies working on huge networks collect huge
critical data logs. All these require advanced SOC-as-
a-Service
SOC Services
(Eagle Eye Services)
• Data aggregation
• Correlation and security monitoring
• Analytics
• Alerting
• Dashboards
• Compliance
• Log Retention (1 Month)
• Incident response
• Defining different reports and sending monthly reports
of all security incidents.
• Monitoring different events on 24*7 basis.
• Threat Intelligence
• User Behaviour & Event Analytics
• Machine Learning
• Real time Threat Hunting & detection
• Intimating customers about security risk and incidents
and suggesting require actions.
• Studying and Reporting anomalies
SOC Eagle Eye
Services
Data
Aggregation
Correlation
& Security
Monitoring
Alerting &
Incident
Response
User
Behaviour &
Event
Analytics
Threat
Intelligence
/Machine
Learning
Reporting/
Compliances
SOC Services
(Security Insight Services)
Security Posture Analysis
• Understanding roles and responsibilities
• System and Network architecture study
• Planning deployment techniques
Security Incident & Threat Analysis
• Integration with monitoring Services
• Devices traffic Monitoring
• Network flow analyzer
• Traffic analysis and reporting
• Network Flow Assessment
• Database Activity Assessment
• Application Performance Assessment
• Performing Vulnerability scans
• Review Application system @ client IT environment
• Monitoring, logging, Reporting
SOC Security
Insight Services
Security
Assessment
Application/
DB Testing-
Assessment
Email &
Wireless
Assessment
Gap Analysis
SIEM
Effectiveness
Modeling
Reports &
Recommend
ation
SOC Services
(Total Secure Services)
• All Security Eagle Eye &
Insight services
deliverables
• Proactive Remediation of
Security incidents with
Customer in Loop
• Onsite availability of
ESDS Security expert at
critical security issues
on resolution advisory
• Periodic client visit of
ESDS Security expert for
verifying security
SOC
Total Secure
Sevices
Security
Incident
Monitoring
Overall
Security
Assessments
Database/
Application
Monitoring
Addon
Services/
Email/
DLP/Wireless
Security
UBEA /Threat
Intelligence/
ML
Proactive
Remediation/
Onsite
Availability
eNlight WAF
Overview
• A software solution designed for protecting web
applications from threats and attacks
• Enterprises are using several public facing
applications
• Detects and prevents OWASP TOP-10 Threats
eNlight WAF Modules
WAF Policy
Management
WAF Ruleset
Management
Report, Log
Management
Applications
Management
Virtual
Patching
PKI
Management
eNlight WAF Features & Lifecycle
1. OWASP Top-10 Defender
2. In-built Load Balancer
3. Source IP Reputation Analysis
4. Log Analysis (SIEM)
5. Learning Mode
6. Virtual Patching
7. Source IP Reputation Analysis
8. Customizable WAF Ruleset
eNlight WebVPN
Features of eNlight WebVPN
Supports Windows, MAC, Linux and mobile OS
Supports for HTML5 applications,
Websocket,
RDP, FTP protocols, CGI applicationsIntegrate with multiple identity
providers simultaneously(AD, LDAP,
Radius etc.)Multifactor authentication with SMS and
Email OTP
Time based OTP with Google and Microsoft
Authenticator
WAF protects from OWASP Top 10
Vulnerabilities
Granular Application Access Control
Benefits of eNlight WebVPN
Anywhere
Accessibility
Anywhere
Deployment
Authorization &
Protection
Interoperability
Across all
desktop OS,
Browsers & Mobile
Devices
Deployment on
Public, on-
Premise or hybrid
cloud for private
secured access
Integrate with
any identity
providers to
authenticate
users
ML capability for
eNlight Web VPN v/s
Legacy VPN
eNlight Web VPN Legacy VPN
• Clientless WebVPN • Client or Agent Based
• More secure- giving access to only
applications
• Less secure- gives access to complete
network
• Cost-effective solution • High Cost
• Granular access control • Fixed access control
• Don’t need to reconnect when Internet
network changes
• Need to reconnect in case of Internet
network changes
• Easy to deploy and use • Complex deployment and usage
• Scalable and HA • Less scalable and HA
• Includes WAF and OWASP Top-10
Vulnerabilities
• WAF and other security features not
available
Thus, for any organization managed security services play an
important role in enhancing the security posture, alerting
against top vulnerabilities along with rapid and anywhere
deployment.
If you’re interested to leverage any of the mentioned managed
security services in your organization,
feel free to reach
Team ESDS throughhttps://esds.co.in/ 1800 209 3006relationship@esds.co.in
Concluding Remarks

More Related Content

What's hot

Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Zscaler
 
Aligning Risk with Growth - Cloud Security for startups
Aligning Risk with Growth - Cloud Security for startupsAligning Risk with Growth - Cloud Security for startups
Aligning Risk with Growth - Cloud Security for startupsMoshe Ferber
 
Zero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeZero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeVishwas Manral
 
CSA SV Threat detection and prediction
CSA SV Threat detection and predictionCSA SV Threat detection and prediction
CSA SV Threat detection and predictionVishwas Manral
 
The Share Responsibility Model of Cloud Computing - ILTA Philadelphia
The Share Responsibility Model of Cloud Computing - ILTA PhiladelphiaThe Share Responsibility Model of Cloud Computing - ILTA Philadelphia
The Share Responsibility Model of Cloud Computing - ILTA PhiladelphiaPatrick Sklodowski
 
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013Moshe Ferber
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorKaspersky
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access Er. Ajay Sirsat
 
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security ChallengesInfosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security ChallengesSkybox Security
 
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...Amazon Web Services
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Moshe Ferber
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceAberla
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Oddscentralohioissa
 
What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero TrustOkta-Inc
 
Zscaler ThreatLabz dissects the latest SSL security attacks
Zscaler ThreatLabz dissects the latest SSL security attacksZscaler ThreatLabz dissects the latest SSL security attacks
Zscaler ThreatLabz dissects the latest SSL security attacksZscaler
 
Secaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidanceSecaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidancedrewz lin
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityMarketingArrowECS_CZ
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Securescoopnewsgroup
 

What's hot (20)

Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
Discover an IT Infrastructure Services & Management
Discover an IT Infrastructure Services & ManagementDiscover an IT Infrastructure Services & Management
Discover an IT Infrastructure Services & Management
 
Aligning Risk with Growth - Cloud Security for startups
Aligning Risk with Growth - Cloud Security for startupsAligning Risk with Growth - Cloud Security for startups
Aligning Risk with Growth - Cloud Security for startups
 
Zero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeZero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at Adobe
 
CSA SV Threat detection and prediction
CSA SV Threat detection and predictionCSA SV Threat detection and prediction
CSA SV Threat detection and prediction
 
The Share Responsibility Model of Cloud Computing - ILTA Philadelphia
The Share Responsibility Model of Cloud Computing - ILTA PhiladelphiaThe Share Responsibility Model of Cloud Computing - ILTA Philadelphia
The Share Responsibility Model of Cloud Computing - ILTA Philadelphia
 
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security ChallengesInfosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
 
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a Service
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
 
What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero Trust
 
Zscaler ThreatLabz dissects the latest SSL security attacks
Zscaler ThreatLabz dissects the latest SSL security attacksZscaler ThreatLabz dissects the latest SSL security attacks
Zscaler ThreatLabz dissects the latest SSL security attacks
 
Secaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidanceSecaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidance
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud Security
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 

Similar to Managed security services

Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessInfopulse
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultAlienVault
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Rightpvanwoud
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier AGC Networks Ltd
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMAlienVault
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarIBM Security
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Netpluz Asia Pte Ltd
 
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...CloudIDSummit
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company PresentationChaitanyaS
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security SessionSplunk
 
Maturing Your Organization from DevOps to DevSecOps
Maturing Your Organization from DevOps to DevSecOpsMaturing Your Organization from DevOps to DevSecOps
Maturing Your Organization from DevOps to DevSecOpsAmazon Web Services
 
Maturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsMaturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsAmazon Web Services
 

Similar to Managed security services (20)

Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVault
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Right
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
 
Mitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-RadarMitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-Radar
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service
 
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company Presentation
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
 
Maturing Your Organization from DevOps to DevSecOps
Maturing Your Organization from DevOps to DevSecOpsMaturing Your Organization from DevOps to DevSecOps
Maturing Your Organization from DevOps to DevSecOps
 
Maturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsMaturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOps
 

More from manoharparakh

Cloud Security Challenges, Types, and Best Practises.pdf
Cloud Security Challenges, Types, and Best Practises.pdfCloud Security Challenges, Types, and Best Practises.pdf
Cloud Security Challenges, Types, and Best Practises.pdfmanoharparakh
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfmanoharparakh
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfmanoharparakh
 
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...manoharparakh
 
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...manoharparakh
 
Hybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdfHybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdfmanoharparakh
 
What is SOC and why do banks need SOC-as-a-Service?
What is SOC and why do banks need SOC-as-a-Service?What is SOC and why do banks need SOC-as-a-Service?
What is SOC and why do banks need SOC-as-a-Service?manoharparakh
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importancemanoharparakh
 
ESDS Community Cloud Offerings
ESDS Community Cloud OfferingsESDS Community Cloud Offerings
ESDS Community Cloud Offeringsmanoharparakh
 
Cloud Computing- Making Banks Futureproof
Cloud Computing- Making Banks FutureproofCloud Computing- Making Banks Futureproof
Cloud Computing- Making Banks Futureproofmanoharparakh
 
Considering Data Centers in India to Overcome Economic Conditions.pdf
Considering Data Centers in India to Overcome Economic Conditions.pdfConsidering Data Centers in India to Overcome Economic Conditions.pdf
Considering Data Centers in India to Overcome Economic Conditions.pdfmanoharparakh
 
Email Migration- Essential Questions to Ask Before Migrating Email
Email Migration- Essential Questions to Ask Before Migrating EmailEmail Migration- Essential Questions to Ask Before Migrating Email
Email Migration- Essential Questions to Ask Before Migrating Emailmanoharparakh
 
Key Technologies for Autonomous Driving
Key Technologies for Autonomous DrivingKey Technologies for Autonomous Driving
Key Technologies for Autonomous Drivingmanoharparakh
 
Key Technologies Impacting Autonomous Driving
Key Technologies Impacting Autonomous DrivingKey Technologies Impacting Autonomous Driving
Key Technologies Impacting Autonomous Drivingmanoharparakh
 
Advanced Data Center Security
Advanced Data Center SecurityAdvanced Data Center Security
Advanced Data Center Securitymanoharparakh
 
Understanding WhatData Center Security Is
Understanding WhatData Center Security IsUnderstanding WhatData Center Security Is
Understanding WhatData Center Security Ismanoharparakh
 
eNlightBot : AI Enabled Chatbot Platform
eNlightBot : AI Enabled Chatbot PlatformeNlightBot : AI Enabled Chatbot Platform
eNlightBot : AI Enabled Chatbot Platformmanoharparakh
 
SOC Services- Enhancing Organization's Cyber & Digital Security Posture
SOC Services- Enhancing Organization's Cyber & Digital Security PostureSOC Services- Enhancing Organization's Cyber & Digital Security Posture
SOC Services- Enhancing Organization's Cyber & Digital Security Posturemanoharparakh
 
Debunking common cloud hosting myths
Debunking common cloud hosting mythsDebunking common cloud hosting myths
Debunking common cloud hosting mythsmanoharparakh
 

More from manoharparakh (20)

Cloud Security Challenges, Types, and Best Practises.pdf
Cloud Security Challenges, Types, and Best Practises.pdfCloud Security Challenges, Types, and Best Practises.pdf
Cloud Security Challenges, Types, and Best Practises.pdf
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdf
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdf
 
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
 
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
 
Hybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdfHybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdf
 
What is SOC and why do banks need SOC-as-a-Service?
What is SOC and why do banks need SOC-as-a-Service?What is SOC and why do banks need SOC-as-a-Service?
What is SOC and why do banks need SOC-as-a-Service?
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
ESDS Community Cloud Offerings
ESDS Community Cloud OfferingsESDS Community Cloud Offerings
ESDS Community Cloud Offerings
 
Cloud Computing- Making Banks Futureproof
Cloud Computing- Making Banks FutureproofCloud Computing- Making Banks Futureproof
Cloud Computing- Making Banks Futureproof
 
Considering Data Centers in India to Overcome Economic Conditions.pdf
Considering Data Centers in India to Overcome Economic Conditions.pdfConsidering Data Centers in India to Overcome Economic Conditions.pdf
Considering Data Centers in India to Overcome Economic Conditions.pdf
 
Email Migration- Essential Questions to Ask Before Migrating Email
Email Migration- Essential Questions to Ask Before Migrating EmailEmail Migration- Essential Questions to Ask Before Migrating Email
Email Migration- Essential Questions to Ask Before Migrating Email
 
Cloud for startups
Cloud for startupsCloud for startups
Cloud for startups
 
Key Technologies for Autonomous Driving
Key Technologies for Autonomous DrivingKey Technologies for Autonomous Driving
Key Technologies for Autonomous Driving
 
Key Technologies Impacting Autonomous Driving
Key Technologies Impacting Autonomous DrivingKey Technologies Impacting Autonomous Driving
Key Technologies Impacting Autonomous Driving
 
Advanced Data Center Security
Advanced Data Center SecurityAdvanced Data Center Security
Advanced Data Center Security
 
Understanding WhatData Center Security Is
Understanding WhatData Center Security IsUnderstanding WhatData Center Security Is
Understanding WhatData Center Security Is
 
eNlightBot : AI Enabled Chatbot Platform
eNlightBot : AI Enabled Chatbot PlatformeNlightBot : AI Enabled Chatbot Platform
eNlightBot : AI Enabled Chatbot Platform
 
SOC Services- Enhancing Organization's Cyber & Digital Security Posture
SOC Services- Enhancing Organization's Cyber & Digital Security PostureSOC Services- Enhancing Organization's Cyber & Digital Security Posture
SOC Services- Enhancing Organization's Cyber & Digital Security Posture
 
Debunking common cloud hosting myths
Debunking common cloud hosting mythsDebunking common cloud hosting myths
Debunking common cloud hosting myths
 

Recently uploaded

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Managed security services

  • 3. About ESDS • Born with a global mind-set, ESDS began its operations from the Tier 2 city of Nashik (India) in 2005 and presently has its footprint in 19 nations across APAC, Europe, Middle East, the Americas and Africa. ESDS acts as a catalyst for digital transformation in the modern outcome-based economy by enabling organizations to embrace advanced technologies. • At ESDS, we believe in creating lifetime relationships and fostering a culture of co-existence by uniting minds that are passionate about delivering innovative solutions and exuberant customer experience. More than 750 organizations, backed by a committed workforce at ESDS, have successfully achieved their business
  • 4. Common Cyber Security Threats Globally
  • 5. Cyber Security in Indian Scenario- A Snapshot 78% Companies with no Cyber incident response plan 74% BFSI Sector is a Top Target 63% attacks amounted to financial loss
  • 7. Eagle Eye Services Security Insight Services SOC SOLUTIONS Total Secure Services SOC Solutions
  • 8. Growing Importance of SOC • Determines the complete security (Cyber, digital & information security) team functionality of any business organization=on • Responsible for assessment and implementation of the security posture for an organization • Deploying and managing layers of security with the aim of protecting valuable data of an organization • SOC-as-a-Service helps the companies to distinguish real threats and act on these problems with higher focus and urgency
  • 9. Growing Importance of SOC (Cont.…) • Involves components like- infrastructure, process, people, and other devices for converting and reactive monitoring, assessment, testing along remediation for all threats- potential as well as actual • Includes constant knowledge, skill and system for pulling out potential threats from large data volumes collected & analysed • Companies working on huge networks collect huge critical data logs. All these require advanced SOC-as- a-Service
  • 10. SOC Services (Eagle Eye Services) • Data aggregation • Correlation and security monitoring • Analytics • Alerting • Dashboards • Compliance • Log Retention (1 Month) • Incident response • Defining different reports and sending monthly reports of all security incidents. • Monitoring different events on 24*7 basis. • Threat Intelligence • User Behaviour & Event Analytics • Machine Learning • Real time Threat Hunting & detection • Intimating customers about security risk and incidents and suggesting require actions. • Studying and Reporting anomalies SOC Eagle Eye Services Data Aggregation Correlation & Security Monitoring Alerting & Incident Response User Behaviour & Event Analytics Threat Intelligence /Machine Learning Reporting/ Compliances
  • 11. SOC Services (Security Insight Services) Security Posture Analysis • Understanding roles and responsibilities • System and Network architecture study • Planning deployment techniques Security Incident & Threat Analysis • Integration with monitoring Services • Devices traffic Monitoring • Network flow analyzer • Traffic analysis and reporting • Network Flow Assessment • Database Activity Assessment • Application Performance Assessment • Performing Vulnerability scans • Review Application system @ client IT environment • Monitoring, logging, Reporting SOC Security Insight Services Security Assessment Application/ DB Testing- Assessment Email & Wireless Assessment Gap Analysis SIEM Effectiveness Modeling Reports & Recommend ation
  • 12. SOC Services (Total Secure Services) • All Security Eagle Eye & Insight services deliverables • Proactive Remediation of Security incidents with Customer in Loop • Onsite availability of ESDS Security expert at critical security issues on resolution advisory • Periodic client visit of ESDS Security expert for verifying security SOC Total Secure Sevices Security Incident Monitoring Overall Security Assessments Database/ Application Monitoring Addon Services/ Email/ DLP/Wireless Security UBEA /Threat Intelligence/ ML Proactive Remediation/ Onsite Availability
  • 14. Overview • A software solution designed for protecting web applications from threats and attacks • Enterprises are using several public facing applications • Detects and prevents OWASP TOP-10 Threats
  • 15. eNlight WAF Modules WAF Policy Management WAF Ruleset Management Report, Log Management Applications Management Virtual Patching PKI Management
  • 16. eNlight WAF Features & Lifecycle 1. OWASP Top-10 Defender 2. In-built Load Balancer 3. Source IP Reputation Analysis 4. Log Analysis (SIEM) 5. Learning Mode 6. Virtual Patching 7. Source IP Reputation Analysis 8. Customizable WAF Ruleset
  • 18. Features of eNlight WebVPN Supports Windows, MAC, Linux and mobile OS Supports for HTML5 applications, Websocket, RDP, FTP protocols, CGI applicationsIntegrate with multiple identity providers simultaneously(AD, LDAP, Radius etc.)Multifactor authentication with SMS and Email OTP Time based OTP with Google and Microsoft Authenticator WAF protects from OWASP Top 10 Vulnerabilities Granular Application Access Control
  • 19. Benefits of eNlight WebVPN Anywhere Accessibility Anywhere Deployment Authorization & Protection Interoperability Across all desktop OS, Browsers & Mobile Devices Deployment on Public, on- Premise or hybrid cloud for private secured access Integrate with any identity providers to authenticate users ML capability for
  • 20. eNlight Web VPN v/s Legacy VPN eNlight Web VPN Legacy VPN • Clientless WebVPN • Client or Agent Based • More secure- giving access to only applications • Less secure- gives access to complete network • Cost-effective solution • High Cost • Granular access control • Fixed access control • Don’t need to reconnect when Internet network changes • Need to reconnect in case of Internet network changes • Easy to deploy and use • Complex deployment and usage • Scalable and HA • Less scalable and HA • Includes WAF and OWASP Top-10 Vulnerabilities • WAF and other security features not available
  • 21. Thus, for any organization managed security services play an important role in enhancing the security posture, alerting against top vulnerabilities along with rapid and anywhere deployment. If you’re interested to leverage any of the mentioned managed security services in your organization, feel free to reach Team ESDS throughhttps://esds.co.in/ 1800 209 3006relationship@esds.co.in Concluding Remarks