Oasys Stonesoft Aligned with ITIL

50 %
50 %
Information about Oasys Stonesoft Aligned with ITIL
Technology

Published on August 18, 2009

Author: chrisjoasys

Source: slideshare.net

Description

OASYS Stonesoft StoneGate Aligned with ITIL V3

10 Quick Wins with ITIL Webinar “ Documented Common Sense” June 23, 2009 Matt McKinley, Senior Network Security Analyst Stonesoft [email_address] Chris Johnson, President Matt O’Buck, International Account Executive Open Access Systems Corporation [email_address] [email_address]

 

http://www.oasyscorp.com/itilv3map.html

RACI Matrix - Focus on Security Activities

 

CONTROL EVALUATE Detect security breaches React to the incidents MAINTAIN Recover your systems IMPLEMENT Protect your assets PLAN Identify the risks Revise processes & protection Security as a Process

1. One-step Security Management Disparate consoles Labor intensive Manual device updates Inherent human error Slow threat mitigation Single management console Create once, deploy everywhere Automatic policy/rule execution Real-time accelerated response to threats Virtual FW Virtual FW Virtual FW Virtual FW One-step Management Events Traditional Device Management FW Mgmt IPS Mgmt Incidents

Create once, use everywhere configuration Common element database Stores all configurations – security policies to OS settings Component re-use = less human errors Always-on management Built-in disaster recovery Repository backup & task automation Customizable roles, rights and actions Simultaneous administration 2. Central Repository (Service Knowledge Database)

Create once, use everywhere configuration

Common element database

Stores all configurations – security policies to OS settings

Component re-use = less human errors

Always-on management

Built-in disaster recovery

Repository backup & task automation

Customizable roles, rights and actions

Simultaneous administration

3. Role-based Access Control (RACI Matrix) One administrator can have several roles Access control lists enable grouping of granted objects Support for RADIUS authentication

One administrator can have several roles

Access control lists enable grouping of granted objects

Support for RADIUS authentication

4. Logs & Auditing (Reports, Compliance, Access) Use audit logs and element meta data to find out WHAT has been changed, WHO has changed it and WHEN has this happened

Use audit logs and element meta data to find out WHAT has been changed, WHO has changed it and WHEN has this happened

5. Next Generation Policy Management Efficient policy management with template-based rule bases and sub-rule bases

Efficient policy management with template-based rule bases and sub-rule bases

5. Next Generation Policy Management (cont.) Find unusued rules, undo/redo changes, create new rules from logs View rule hit counts (within specified time) in the policy editor Undo/redo the changes in the policy editor Organize your policy with the help of collapsible rule comment sections Create new rules directly from the logs Search matching rules quickly

Find unusued rules, undo/redo changes, create new rules from logs

View rule hit counts (within specified time) in the policy editor

Undo/redo the changes in the policy editor

Organize your policy with the help of collapsible rule comment sections

Create new rules directly from the logs

Search matching rules quickly

6. Real-time Monitoring & Alerting (Service Operations) Customizable dashboards & alerting chains Geographic pinpointing of IP addresses Web portal for monitoring security from any device

Customizable dashboards & alerting chains

Geographic pinpointing of IP addresses

Web portal for monitoring security from any device

7. Accelerated Incident Management (Service Operations) Correlated view Real-time & historical views Detailed audit histories Powerful data mining engine Drag & drop log filtering Efficient & accurate data retrieval Statistical event analysis Incident case management Suspect activity centrally collected Investigation audit trail

Correlated view

Real-time & historical views

Detailed audit histories

Powerful data mining engine

Drag & drop log filtering

Efficient & accurate data retrieval

Statistical event analysis

Incident case management

Suspect activity centrally collected

Investigation audit trail

8. Multi-Link ™ Communication (Availability & Capacity Management) Seamless circuit failover Active/active Eliminates costly failover systems or BGP management Low-cost alternative to Frame Relay, MPLS Scalable and secure Unlimited number & types of connections Support for emerging technologies VoIP, video conferencing Remote Office Corporate Headquarters MPLS INTERNET DSL Cable Modem DSL

Seamless circuit failover

Active/active

Eliminates costly failover systems or BGP management

Low-cost alternative to Frame Relay, MPLS

Scalable and secure

Unlimited number & types of connections

Support for emerging technologies

VoIP, video conferencing

8. Drop-in Active Clustering (cont.) (Availability & Capacity Management) Firewall/VPN Cluster Uniquely cluster up to 16 devices Achieve Five Nines availability Zero impact to network re-configuration No maintenance window required Clusters managed as “single” instance Clustered VPN – provides seamless failover Node 1 33% Node 2 33% Node 3 33%

Firewall/VPN Cluster

Uniquely cluster up to 16 devices

Achieve Five Nines availability

Zero impact to network re-configuration

No maintenance window required

Clusters managed as “single” instance

Clustered VPN – provides seamless failover

8. Dynamic Server Load Balancing (cont.) (Availability & Capacity Management) Eliminates the need for external hardware Unlimited server load balancing Intelligently monitor availability & health Optimized traffic Automatic corrective actions Transparent server maintenance Automatically distribute traffic No restrictions on number of servers or client connections Server Pool Load Balancing

Eliminates the need for external hardware

Unlimited server load balancing

Intelligently monitor availability & health

Optimized traffic

Automatic corrective actions

Transparent server maintenance

Automatically distribute traffic

No restrictions on number of servers or client connections

9. Interactive Reporting Enhanced customizable graphical reports Automated generation & distribution System auditing reports & audit trails Comparative analysis of security policies

Enhanced customizable graphical reports

Automated generation & distribution

System auditing reports & audit trails

Comparative analysis of security policies

10. Stonesoft – Powered by Reliability No forklift upgrades – phased-in approach Always-on connectivity technologies Third-party event management Rule-base translation tools Turnkey solutions delivery Direct support vs. tiered support Dedicated engineers, average 6+ years experience Follow the sun – Atlanta and Helsinki Commitment to customer success throughout organization Track record of technology innovation 38 patents & 28 patents pending “ The superior level of support provided by Stonesoft is the benchmark we use to measure all of our other vendors.” - National City Bank 2008 Customer Satisfaction Results 95% Overall Satisfaction

No forklift upgrades – phased-in approach

Always-on connectivity technologies

Third-party event management

Rule-base translation tools

Turnkey solutions delivery

Direct support vs. tiered support

Dedicated engineers, average 6+ years experience

Follow the sun – Atlanta and Helsinki

Commitment to customer success throughout organization

Track record of technology innovation

38 patents & 28 patents pending

10 Quick Wins Stonesoft ITIL Win 1. One-step Security Management Single pane of glass view Improves Security Management across the entire enterprise from core to edge. 2. Central Repository Current, correlated Service Knowledge Database shares information for reporting. 3. Role-based Access Control Centrally managed information access based on roles directly implemented by the SMC. 4. Logs & Auditing Easily accessible and ensures Compliance. 5. Next Generation Policy Management Standardized policies, consistency with less administration , SLA/OLA Management, at perimeter and internal. 6. Real-time Monitoring & Alerting More efficient Service Operations. 7. Accelerated Incident Management Faster Troubleshooting & Resolution; feeds a knowledge error database. 8. Patented Multi-Link Communication, Drop-in Active Clustering, Dynamic Server Load Balancing Guaranteed High Availability at the component and link level for reliability, to ensure Always-on Connectivity; Enhanced and Secure Data Delivery. 9. Interactive Reporting Reports for Continual Service Improvements 10. Stonesoft Reliability Easy Implementation, Reliability, Maintainability & proven long-term Serviceability.

Thank You (866) 869-4075 [email_address] www.stonesoft.com

Add a comment

Related presentations

Presentación que realice en el Evento Nacional de Gobierno Abierto, realizado los ...

In this presentation we will describe our experience developing with a highly dyna...

Presentation to the LITA Forum 7th November 2014 Albuquerque, NM

Un recorrido por los cambios que nos generará el wearabletech en el futuro

Um paralelo entre as novidades & mercado em Wearable Computing e Tecnologias Assis...

Microsoft finally joins the smartwatch and fitness tracker game by introducing the...

Related pages

Oasys | LinkedIn

Oasys Stonesoft Aligned with ITIL. 3,045 Views. chrisjoasys. A10 Itil Oasys Webex 090309. 3,043 Views. charlesmartin14. Oasys. 567 Views. UReasonChannel.
Read more

Sean Borner (@sborner) | Twitter

Oasys Stonesoft Aligned with ITIL https:// lnkd.in/ePHgiN2 . 0 replies 0 retweets 0 likes. Reply. Retweet. Retweeted. Like. Liked. More. Copy link to Tweet ...
Read more

Sean T. Borner | LinkedIn

View Sean T. Borner’s professional profile on LinkedIn. LinkedIn is the world's largest business network, ... Oasys Stonesoft Aligned with ITIL
Read more