Upload
buibao
View
282
Download
2
Embed Size (px)
Citation preview
INFOSYS CYBER SECURITY PLATFORM (iCSP)
External Document © 2018 Infosys LimitedExternal Document © 2018 Infosys Limited
Enterprises going digital has hastened the shift to cloud computing, made access through mobile devices ubiquitous and increased the adoption of Internet of Things (IoT). These developments have led to the attack surface being broadened significantly and defense becoming more complex. When you combine a massively
distributed fleet of autonomous devices that are capable of making decisions and directly affecting the physical state of people and things, you have a considerable risk to manage. This is not a scenario that most enterprises are familiar with managing. To add to these problems, it has been consistently seen that around 50% of
cyber breaches are caused by deliberate malicious actions or mistakes inadvertently made by internal employees and partners. Other issues like regulatory compliance pressure and the problems associated with hiring and retaining appropriately skilled engineers makes managing these cyber security challenges more difficult.
The journey enterprises have undertaken to handle the plethora of cyber security challenges has led to a situation where they are increasingly grappling with -
• Lack of a unified and integrated view of cyber security as individual stakeholders(silos) handle parts they are responsible for without taking a holistic view
• Improper asset management systems leading to unpatched applications serving as entry point for cyber attacks
• Disparate tools, technologies and dashboards
• Reactive approach to managing cyber breaches leading to costly consequences
• Inability to take real time action due to dependence on human intervention oriented processes and protocols to handle a cyber-attack
Given the above scenario enterprises are realizing that the need of the hour is an end to end, flexible and adaptive Managed Security Service delivered as an integrated package.
Did you know?
Cybercrime will become a $2.1 trillion problem by 2019? It typically takes 229 days for an Enterprise to detect a resident Advanced Persistent Threat?
COMPLIANCEHUMANERROR
SKILLS GAPADVANCED
ATTACKS INNOVATION
External Document © 2018 Infosys LimitedExternal Document © 2018 Infosys Limited
The Infosys Cyber Security Platform (iCSP) has been custom built to address the above challenges and to provide end to end Managed Security Services to enterprises. Built with Artificial Intelligence(AI) driven automation at its core, it helps the custodians of enterprise cyber security to address most of their cyber security challenges through a single unified platform.
The range of Managed Security Services provided through iCSP are -
• Managed Detection & Response Services with Predictive Threat Analytics
• Identity & Access Management Services
• Unified Vulnerability Management Services
• Data Security Services
• Governance, Risk & Compliance Management Services
Backed by leading global technologies like IBM, Resilient, Symantec, Rapid7, RSA Archer etc, iCSP provides a range of Managed Security Services in a cost effective manner, with the flexibility to opt either for an end to end service package, or pay as you go services.
We have state of the art Command Centers at Raleigh, North Carolina and Indianapolis, Indiana to provide Managed Detection & Response Services. These Command Centers have local SWAT teams to help remediate breaches and secure the enterprise. The existence of RED Team exercises from these Command Centers enable our customers to stay one step ahead of malicious hackers.
Key Ingredients – For Comprehensive Protection
Do away with siloedapproach, focus on
unified view
Orchestrate IR processes to resolve incidents faster,
effectively, and intelligently.
Breach investigation, actionable guidance, incident analytics
and remediation
Real-time monitoring for a comprehensive view of
vulnerabilities and incidents
Normalize intelligence feeds, actionable intelligence
enabling proactive hunting
THREAT HUNTING
EARLY DETECTION
FORENSICSINTEGRATED APPROACH
AUTOMATEDINCIDENT RESPONSE
© 2018 Infosys Limited, Bengaluru, India. All Rights Reserved. Infosys believes the information in this document is accurate as of its publication date; such information is subject to change without notice. Infosys acknowledges the proprietary rights of other companies to the trademarks, product names and such other intellectual property rights mentioned in this document. Except as expressly permitted, neither this documentation nor any part of it may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, printing, photocopying, recording or otherwise, without the prior permission of Infosys Limited and/ or any named intellectual property rights holders under this document.
For more information, contact [email protected]
Infosys.com | NYSE: INFY Stay Connected
Given below is a pictorial view of the iCSP platform based Managed Security Services :
Infosys – Cyber Security Platform
CISO Dashboards
Analyst Workbench AI Service Portal Self Services
PortalBilling and Usage Security Incident
Reports
Managed Detection and
Response Services
Identity as a Service
Unified Vulnerability Management Service
Data Security Services
Governance, Risk & Compliance
Services
Event Processing Stream Analytics Deep Learning IBM App Scan QRadar Rapid7 ….
….
Managed Security Services
Predictive Security Services Security Tool Adapters
Cyber Security Partnership
Cyber Security Services
The key benefits of availing iCSP based Managed Security Services are:
• Reliable IT infrastructure and systems leading to interruption free business operations for the enterprise
• Access to a range of on demand SLA based Managed Security Services leading to minimized cyber security risks and reduced costs of compliance
• Availability of real time dashboards and reports providing insights on a range of key cyber security metrics on a regular basis
• Trusted advisory services to keep the enterprise up to date to prevent cyber security breaches
• End to end services handled in a unified manner providing peace of mind to stakeholders
SECURITY ASSURED!