Top Banner
Copyright © 2014 EiQ Networks, Inc. All rights reserved. SOCVue Security Monitoring Service 1
9
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: SOCVue Security Monitoring Service

Copyright © 2014 EiQ Networks, Inc. All rights reserved.

SOCVue Security Monitoring Service

1

Page 2: SOCVue Security Monitoring Service

Copyright © 2014 EiQ Networks, Inc. All rights reserved.2

Security Monitoring Challenges

Technology• Expensive• Difficult to Manage

SANS Survey - Critical Security Controls: From Adoption to Implementation

People & Process• Security Expertise• Budget• Resources

Page 3: SOCVue Security Monitoring Service

Copyright © 2014 EiQ Networks, Inc. All rights reserved.3

• Only 20% were confident in their technology to mitigate security risk

• Only 15% felt that their people are “well prepared” for security incidents

• Only 31% have a solid process for cyber defenses

EiQ Survey Results

Page 4: SOCVue Security Monitoring Service

Copyright © 2014 EiQ Networks, Inc. All rights reserved.4

SOCVue® Overview

Continuous Security Program

Managed SIEM & Log Management

Compliance Reporting

Security Visibility

24x7 Security Operations CenterManaged

ProcessTechnology People

Log Management& SIEM

Security Controls Auditing

Page 5: SOCVue Security Monitoring Service

Copyright © 2014 EiQ Networks, Inc. All rights reserved.5

Security Visibility

Log Management& SIEM

You can’t secure what you can’t seeContinuous Security Visibility Into the Things That Matter

Network Devices

Security Devices

Applications

Operating Systems

ALL DATA

Page 6: SOCVue Security Monitoring Service

Copyright © 2014 EiQ Networks, Inc. All rights reserved.6

Security Controls

The Best Defense… Is A Great Offense!

Security Controls

Are there unauthorized nodes on our network?

Is any unauthorized software running on our network?

Are hosts and devices configured securely?

Are there nodes with vulnerabilities on our network?

Are proper malware defense in place on our network?

Are there any unauthorized wireless access points on our network?

Are there any unauthorized ports & protocols on our network?

Is proper event logging in place?

Page 7: SOCVue Security Monitoring Service

Copyright © 2014 EiQ Networks, Inc. All rights reserved.7

Compliance Reporting

Monitor. Report. Improve.

Continuous assessment instead of a one-time checklist

Page 8: SOCVue Security Monitoring Service

Copyright © 2014 EiQ Networks, Inc. All rights reserved.8

Managed SIEM & Log Management

Benefits:• Meet compliance-driven audit log requirements• Automate incident detection using all relevant

security & threat intelligence• Improve overall security posture via timely

detection and notification of security incidents

Without:• Increased headcount• Large capital expenses• Specialized training on SIEM product

Managed by EiQ SOC Team… So you don’t have to

Page 9: SOCVue Security Monitoring Service

Copyright © 2014 EiQ Networks, Inc. All rights reserved.9

Summary - SOCVue Security Monitoring Service

Request a Free 2-Week Trialwww.eiqnetworks.com/socvue