Top Banner
© This document contains confidential and proprietary information of GSS America. It is furnished for evaluation purposes only. Except with the express prior written permission of GSS America, this document and the information contained herein may not be published, disclosed, or used for any other purpose. | www.gssamerica.com Network & Security
15

Network security offering

Oct 19, 2014

Download

Documents

Network security offering
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Network  security offering

© This document contains confidential and proprietary information of GSS America. It is furnished for evaluation purposes only. Except with the express prior written permission of GSS America, this document and the information contained

herein may not be published, disclosed, or used for any other purpose. | www.gssamerica.com

Network & Security

Page 2: Network  security offering

Network Service Overview

Network Services

Communication Service Providers Equipment Manufacturers Enterprise Customers

• Network Design Assistance• Solution Roll-out Support • Service Delivery• Remote Provisioning• Service Assurance• Technology Migration Assistance• Network Integration Testing

• Global Network Mgmt• (FCAPS) – L1, L2, L3• Network Application• Performance Optimization• QoS Management• Vendor Management• Managed Security

• Network Design Assistance• Remote Deployment• Solution Testing & • Implementation support• Network Performance

Optimization• TAC Support

2

Page 3: Network  security offering

Service Assurance

Network Monitoring L2, L3 network Management Capacity Analysis & reporting Network Optimization Service Level Management

Network Services for Communication Services Providers

ServiceDelivery

Order entry SolutionValidation DeploymentPlanning Fieldco-ordination Remote DeviceConfiguration

Remote Test &Turn-up

Solution Roll-outSupport

Conformance Testing

Test cases &Scenarios

Network Modeling

Network Integration Testing

Recommendations

Network DesignAssistance

RequirementAnalysis

Proof ofConcept

High Level Design

Low Level design

Design Documentation

TechnologyMigrationAssistance

TechnologyReadinessAssessment

RemoteTechnologyMigration

Project Planning & Management

3

Page 4: Network  security offering

Monitoring of Network links for Availability

• Event Notification via Telephone/ Email in case of any downtime.• Daily Event Summary Reports• Weekly Availability and Link/MPLS port Health Check Reports• Monthly Trend Analysis reports for availability• Monthly Trend Analysis for utilization• Online utilization report

• Cisco routers• Cisco Switches• SNMP compatible router of Switches.• MPLS ports• Frame Relay Link (Subject to FR

switch supporting SNMP)

• Monitoring of availability of the links.• Reporting the errors on the link• Reporting the fluctuations on the link• Reporting the utilization of the link• Reporting the protocol wise traffic

distribution on the link. This service requires specific tools to be deployed and configured.• Utilization threshold on link

Service Features Supported Platforms Deliverables

4

Page 5: Network  security offering

Monitoring of Network Devices for Availability & Performance

• Event Notification via Telephone/ Email in case of any downtime.• Daily Event Summary Reports• Weekly Availability of devices and Health Check Reports• Monthly Trend Analysis reports for availability• Monthly Trend Analysis for CPU utilization• Online utilization report for CPU

The following are specifically supported• Cisco routers• Cisco Switches• Cisco WAAS • SNMP compatible Router and Switches of any make.• Other devices (Case to Case basis)

• Monitoring of availability of the network devices• Monitoring of CPU utilization of the device• Monitoring of the links terminated

on the devices• Monitoring of the hard ware failure of devices like FAN, Interface Cards, Power Supply (subject to availability of SNMP MIB)

Service Features Supported Platforms Deliverables

5

Page 6: Network  security offering

Administration and Management of Network Devices

• Daily Summary Reports • Weekly Trend analysis • Monthly Trend Analysis • RCA report for any unscheduled downtime.

• Cisco Routers• Cisco Switches• Cisco WAAS

• Management and Administration of routers, switches• Management of VLAN on L2 and L3 switches• Monitoring of errors on network or LAN & resolution.• CPU and memory utilization monitoring and management of traffic• Log management (recycling of logs, log preservation)• Monitoring of routing update and traffic• Application of Assess Control List• Routing management of traffic.• Backups before and after each GSS change

Service Features Supported Platforms Deliverables

6

Page 7: Network  security offering

Global Operations Command Center (GOCC) for 24x7 support

Our Global Operations Command Centre (GOCC)Infrastructure optimization enables an organization to realize the value of their IT infrastructure investments and convert them into a strategic asset. With the current economic situation, focus is on improving IT efficiency and optimizing existing IT investments, while reducing capital and operating expenditure on existing and new IT investments.

Key drivers for optimization include business alignment, data centre consolidation, services consolidation, mitigating downtime costs, globalization, virtualization, security,‘going green' along with project, staff, and service level/performance assessment

GSS solutions to IT optimization and Virtualization are holistic and client centered. GSS adapts its solutions to meet each organization’s optimization and virtualization goals, whether they are cost reduction, improved energy efficiency, enhanced response to customers, improved responsiveness to business needs or a combination of these and others.

GSS America’s COE has developed offerings which provide enterprises with the flexibility necessary to address the challenges today. The services are depicted below.

7

Page 8: Network  security offering

Managed Security Services

Managed Security Services (MSS)

Intrusion Detection & Management

Perimeter Security Management

Identity Software Management

Vulnerability Assessment & Management

Security Advisory Services

Mon

itorin

g &

Aler

ting

Maintenance & Support

8

Page 9: Network  security offering

Security Advisory Services

• Up-to-date Information about possible vulnerabilities respective to the IT infrastructure of the client• Security experts available 24x7 for any IT security related assistance

• Latest Vulnerability notification• Patch release notification & Virus warnings• On-site and Remote Incident Management support

• Security Advisory Services • Intrusion Detection & Mgmt• Perimeter Security Management• Identity Software Management• Vulnerability Assessment & Mgmt

MSS Deliverables Benefits

To be secure, it is necessary to have timely information, to defend against the latest threats & vulnerabilities. Expert assistance onsite/off-shore is also required for solving emergency IT security issues.

9

Page 10: Network  security offering

Intrusion Detection & Management

• 24x7 offshore / onsite Management of IDS • Skilled & Certified IDS Experts managing the IDS with SLAs• Lower cost – Manpower & Tools

• Analysis of IDS events (elimination of false positives)• Incident Based Reporting, Escalations and support• IDS Policy Management• Intrusion Trend Analysis and reporting

• Security Advisory Services • Intrusion Detection & Mgmt• Perimeter Security Management• Identity Software Management• Vulnerability Assessment & Mgmt

MSS Deliverables Benefits

Monitor network and host activities, analyze it for signs of intrusions and respond to block/contain them

10

Page 11: Network  security offering

Perimeter Security Management

• 24x7 offshore / onsite Management • Analysis reports to assist better planning• Lower cost – Manpower & Tools• Certified experts

• Log analysis• Patch/Signature Updation & OS

hardening• Availability Monitoring• Change Management (Policies, Access lists & User Mgmt)• Configuration backup & restoration assistance• Trend analysis and reporting

• Security Advisory Services • Intrusion Detection & Mgmt• Perimeter Security Management• Identity Software Management• Vulnerability Assessment & Mgmt

MSS Deliverables Benefits

Management of Firewalls, VPNs, Routers & gateway anti-virus solutions

11

Page 12: Network  security offering

Identity Software management

• Analyze reports to assist in better planning• Lower cost – Manpower & Tools• Experience & Certified security professionals 24x7 for any assistance

• Change Management of the applications• Up gradation and fine-tuning of

the applications• Analysis reports with recommendations

• Security Advisory Services • Intrusion Detection & Mgmt• Perimeter Security Management• Identity Software Management• Vulnerability Assessment & Mgmt

MSS Deliverables Benefits

Management of Security Applications based on PKI, Directory Services and Single-Sign-on solutions

12

Page 13: Network  security offering

Vulnerability Assessment & Management

• Certified experts performing the Security Audits• Analysis reports to assist better planning• Low tool cost

• Vulnerability Assessment of – Networks, Systems, Databases, Applications• Policy & Process compliance checks• Vulnerability fixing / hardening• Penetration Testing

• Security Advisory Services • Intrusion Detection & Mgmt• Perimeter Security Management• Identity Software Management• Vulnerability Assessment & Mgmt

MSS Deliverables Benefits

Assess the security of IT infrastructure periodically Security effectiveness & compliance checks

13

Page 14: Network  security offering

Managed Firewall Services

• Event Notification via Telephone/ Email in case of any Firewall Outage.• Daily Event Summary Reports• Weekly Availability and Firewall Health Check Reports• Monthly Trend Analysis reports• Other Customized reports can be provided as per client requirements

• Check Point• Cisco PIX• Netscreen• WatchGuard• Symantec• Nokia/ Nortel Alteon appliances• SonicWALL

• Initial and monthly assessments of firewall setup• Firewall administration, including rule changes for services to be turned on or off;

monitoring of traffic flow to and from IP addresses and ports• Backups before and after each GSS change• VPN configuration or maintenance (Based on requirement)• Software upgrades, patches or other version-related maintenance of Firewalls• 24 x 7 Device Availability Monitoring• Security Event Inspection• Alert Prioritization & Response • Firewall Log Monitoring• Firewall Log maintenance service

Service Features Deliverables Benefits

14

Page 15: Network  security offering

Network & Security Transition Framework

During the planning phase, a Knowledge Transfer Plan will be created. Stakeholders will be identified, project assumptions will be validated, and SLAs will be identified and defined. During this phase, a Communication Plan will also be defined

During the transition Phase, knowledge transfer (KT) will take place followed by Shadow and Primary support. The KT sessions will lead to the creation of System Appreciation documents and KM database

During the Steady State Phase, the full strength team will be delivering as per scope of services.

Continuous Improvement is constantly taking place once the Steady State Phase is reached. Periodic reviews to identify areas for improvement will take place. As a result of these continuous improvements, further improvements in quality and productivity will be gained

Transition Planning Transition Execution / Shadow supportAc

tivity

Gro

upin

g&

Sequ

encin

g

Risk

As

sess

men

t

Know

ledg

e Tr

ansf

er

Deta

iled

data

co

llect

ion

To-B

e To

ols

&Pr

oces

s de

sign

Setu

p of

fsho

re

supp

ort

Primary

Shadow

Reve

rse

Shad

ow

Steady State

Improved

service

Better

Proc

esses

Updated

Know

ledge b

ase

Revie

wRe

quire

men

ts

Envir

onm

ent

Info

rmat

ion

Due Diligence

Knowledge Transfer

Shadow Support

Steady State

SLA Measurement starts

X:WEEKS Y:WEEKS

15