© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.
Polycom event Security Briefing
12/03/14
Level 3 Managed Security Solutions Overview
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.2
The security problem of today’s environment
Changing Business Models Evolving Threat Landscape Complexity and Fragmentation
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.3
"Digital business – characterized by cloud, social, analytics, mobility and IoT - is an unstoppable and irresistible catalyst for change; change that will affect the fundamental foundations and baseline assumptions of every business…creating significant security implications.”
-- Gartner, 2014
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.4
*Available in Latam and EMEA today
Managed and Professional Services
• Private Line, Wavelength and Ethernet Transport
• MPLS VPN and VPLS Solutions
• Dark Fiber and Managed Fiber
• Managed Network Services
• Cloud Connectivity
• Data Centers
• Managed Hosting Services*
DATA NETWORKS
• Internet Services
• Vyvx® Solutions
• Content Delivery Network (CDN)
CONTENT DISTRIBUTION
• Voice
• Contact Center
• Unified Communications and Collaboration
• Audio, Video and Web conferencing services
VOICE AND UC&C
• Managed Security: (MFW, IDS/IPS, Web Filtering, DLP, Incident Response)
• DDoS Mitigation
• Secure Access
• Security Consulting
• Threat Analytics
• Log Management
• SIEM
SECURITY
• WAN Optimization
• Website Acceleration
APPLICATION PERFORMANCE
Security is a critical component of our comprehensive portfolio
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.5
Level 3 Security Operations Center (SOC)
Responsible for Securing Our Global IP Network
• 24 x 7 x 365 support, providing always on monitoring and management
• Provide managed security solutions backed by our people, systems and data
• The same team charged with protecting Level 3’s global infrastructure will be monitoring and managing your security solutions
• Our network and visibility into threats provides our security team with exceptional data – we leverage this information to protect your assets
20,000+ENTERPRISE CUSTOMERS
120,000NETWORK ELEMENTS
140,000ROUTE MILES
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.6
Level 3 Security Operations Center
Provided With Exceptional Visibility In To A Dynamic Threat Environment
350,000Alerts Per Day
1000Command and Control Servers
1+ Million Malicious Packets Per Day
1.7+ MillionInfected Machineswith proprietary threat intelligence systems
36+ BillionNetflow Sessions Per Day
40% OF THREATS DETECTED WERE PREVIOUSLY
UNKNOWN
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.7
Accelerate Organic Growth:
Secure all Network
customers
Differentiate Level 3 ℠Security
Solutions
Focus on Cloud-based
Services
Expand Addressable
Market
Level 3 Security Strategy
Increase attach-rate of Managed Security Services to Network sales through targeted marketing
Extend Level 3’s unique threat intelligence to our customers, enabling informed security decisions and more control
Enable customers to migrate to more scalable Security solutions, with less operational impact and robust protection by Level 3
Serve more customers through new products and geographic expansion
Enabling enterprises to address increasingly complex Security challenges through network and cloud based security solutions
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.8
Protecting the Networked World
Secure Connectivity – Locking down network and Internet connections – Securing remote access
Secure Cloud– Extending border security to include cloud– Threat mitigation
Secure Mobility– Maintain secure connectivity and productivity on
the move– Protecting employee BYO Device
Secure Web– Safeguard online business– Content encryption, authentication, SSL
Security Consulting– Risk analysis, compliance audit readiness
Security Operations Center– 24 x 7 monitoring and mitigation by experts
Cyber attacks on the Enterprise are occurring on multiple fronts. A holistic, multi-layered approach is needed to manage risk to brand and intellectual property
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.9
Level 3SM Cloud Security Solutions
Advanced SOC: 24 x 7 SOC that can cost effectively monitor,
track and mitigate threats, utilizing the expertise and knowledge
gained from protecting Level 3’s global network/infrastructure
Unmatched Attack Traffic Visibility: A global network backbone
with visibility in to attack traffic and advancing threats (IP, DNS,
CDN)
Comprehensive Internal And External Security: global security
provider responsible for securing both your network and cloud
based infrastructures, providing physical (network), logical (IP)
and content security
Proactive Versus Passive Mitigation: Ability to be more
proactive, using our data and analytics to see threats forming
while taking proactive measures ahead of an attack or more
quickly mitigating an attack if/when one does occur with our
visibility, control and data
What Makes Level 3 Unique?
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.10