security solutions library/unisys... · operationalize security. actionable steps based on...
TRANSCRIPT
Essential Preparation for the Inevitable Security Breach The digitization of society has brought cybersecurity to the forefront of executives’
and boards’ minds. Rapid adoption of technology has increased both the
amount of data to protect and the available attack surface. As a result, breaches
have become more public and costly for the enterprise. Laws and regulations
are catching up, placing new, more stringent compliance requirements on
organizations. These factors have led to a severe shortage in cybersecurity talent,
leaving organizations struggling to identify, hire and retain people with the skills
necessary to protect the enterprise.
Protection of critical information requires a holistic, comprehensive and integrated
security strategy underpinned by automation, machine learning and advanced
analytics. Unisys Security Solutions support this strategy with a combination
of leading technology, services and analytics that streamline client security
operations to improve visibility and create a defensible position for the board.
Incident ResponseThe dynamic threat landscape has increased the need for organizations to have
effective incident response capabilities. The proliferation of technology in the
enterprise, coupled with well-funded adversaries and highly publicized breaches
means that every organization must have an incident response plan, and be
prepared to use it.
SECURITY SOLUTIONS SUITE � TrustCheck™
� Incident Response Ecosystem
� Advanced Endpoint Protection
� Vulnerability Management
� Security Information and Event
Management (SIEM)
� SIEM Essentials
� Security Device Management (SDM)
� Governance Risk and Compliance
(GRC)
� Segmentation Solution with
Unisys Stealth®
� Identity and Access Management
Services (IAM)
INCIDENT RESPONSE ECOSYSTEMSECURITY SOLUTIONS
© 2018 Unisys Corporation. All rights reserved.
Unisys and other Unisys product and service names mentioned herein, as well as their respective logos, are trademarks or registered trademarks of Unisys Corporation. All other trademarks referenced herein are the property of their respective owners.
THE UNISYS SECURITY SOLUTIONS ADVANTAGE � Full breadth and depth of integrated
security services, including incident
response, governance, online risk
management, compliance, SIEM,
advanced endpoint protection,
segmentation, security device
management, vulnerability
management and identity and
access management.
� Integration with Unisys IT
services, simplifying your IT
outsourcing model and helping you
operationalize security.
� Actionable steps based on
next-generation technologies
with the latest security solutions
to protect you against emerging
threats.
� Four Security Operations Centers
to manage, monitor and respond
to your cybersecurity needs 24x7,
freeing you from operational
hassles.
� Flexible solutions, based upon your
specific needs, such as dedicated
on-site delivery, remote delivery
or a combination of both.
� Unisys-proprietary TrustCheck
methodology to measure and align
the effectiveness of your internal
security controls to various industry
and regulatory standards.
� Improved configuration and insights
from your operations driven by
advanced analytics.
� Recognition from leading industry
analysts.
For a robust security posture contact [email protected]
or visit www.unisys.com/mss
To operationalize incident response (IR),
you first need a plan. Once that plan is in
place, you must test it regularly, with both
table-top and live-response exercises, to
make sure your team is ready. You can
achieve this and more with Unisys as your
trusted partner, ensuring that when you
have an incident, you’re prepared to take
the appropriate action.
Unisys Incident Response Ecosystem
is a subscription service that provides
organizations with a defensible position by
proactively maturing the IR program and
deploying incident handlers at a moment’s
notice. Unisys IR consultants work with your
team on quarterly consulting engagements
to refine your organization’s IR plan, prepare
your team to respond and improve your IR
maturity.
If an incident occurs during the
subscription, you can leverage our onsite
response services to quickly engage skilled
resources in time-sensitive response
activities. The Unisys Incident Response
Solution provides up to 120 hours of onsite
consulting, assisting IR efforts with services
such as log review, data collection, patching
and communications.
In addition, Unisys offers one of the
following proactive consulting activities each
quarter, to further mature your IR:
� Incident response policy review
� Endpoint assessment
� Threat hunting
� Table-top exercise
� Consulting gap assessment
� Operational benchmark (time to detect
and respond)
Unisys Expertise Unisys is committed to your security
excellence. As an IT Operations company,
we understand the complexities that exist in
unlocking the value promise of leading-edge
technology. In supporting organizations as a
trusted partner, we focus not only on 24x7
quality operations support, but on improving
security capabilities quarter over quarter.
Our team of experienced consultants
and analysts helps organizations achieve
maximum return on their technology
investments, removing the complexity of
having to hire and retain niche skillsets.
Unisys Security Solutions take a data-
driven, advanced analytics approach to
security, leveraging insights to optimize
leading practices and security technology
configurations for our clients’ environments.
Printed in the United States of America 09/18 18-0383