vulnerability management service - tata … 2p_tc_vulnerability_management_service-ver2.0_oct-2008...

2
The volume of security vulnerabilities affecting today’s organizations is staggering. Left unattended, these threats expose the network to remote exploits, data leakage and data theft, resulting in costly downtime and dissatisfied customers. More and more organizations are seeking automated solutions that identify the key actions needed to safeguard their networks and maintain uptime in support of critical business activities. Tata Communications has partnered with Qualys to deliver Vulnerability Management Service (VMS)—a proactive solution for detecting and prioritizing security vulnerabilities. Designed for both large-scale global deployments and small or remote offices, VMS is an on-demand service that provides discovery, policy creation, scanning, reporting and remediation workflows to quickly and accurately identify security vulnerabilities and guide remediation activities. With VMS, organizations can stay focused on core business objectives and strategic IT priorities instead of expending valuable staff resources to identify and prioritize security vulnerabilities and the resulting exposure. Expert Management VMS delivers a highly structured set of capabilities for automating vulnerability management. Using a phased approach to initiate the service, Tata Communications helps identify an organization’s network connected assets— subsequently categorizing and prioritizing remediation activities based on asset value and the severity of identified vulnerabilities. Automated Reporting Tata Communications’ VMS includes automated reports delivered via the web or email to provide access to scan results, alerting IT administrators to new vulnerabilities and enabling fast response. Customized, on-demand reports can be segmented by business unit, business process or span of control for executive and technical managers’ review to meet an organization’s unique requirements. Trend reporting provides vulnerability and remediation trending by asset group and device to monitor and measure performance in remediation activities. Scalable Architecture VMS’ on-demand architecture leverages a self-contained scanning appliance for network integration, eliminating the need to address hardware configuration and software management and maintenance. The simplicity and flexibility of this architecture helps Tata Communications bring VMS online quickly, minimizing demands on an organization’s IT staff and enabling rapid results. Enterprise Managed Security Services Vulnerability Management Service Proactive security assurance

Upload: buimien

Post on 10-Mar-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

The volume of security vulnerabilities affecting today’s organizations is staggering. Left unattended, these threats expose the network to remote exploits, data leakage and data theft, resulting in costly downtime and dissatisfi ed customers.

More and more organizations are seeking automated solutions that identify the key actions needed to safeguard their networks and maintain uptime in support of critical business activities.

Tata Communications has partnered with Qualys to deliver Vulnerability Management Service (VMS)—a proactive solution for detecting and prioritizing security vulnerabilities.

Designed for both large-scale global deployments and small or remote offi ces, VMS is an on-demand service that provides discovery, policy creation, scanning, reporting and remediation workfl ows to quickly and accurately identify security vulnerabilities and guide remediation activities.

With VMS, organizations can stay focused on core business objectives and strategic IT priorities instead of expending valuable staff resources to identify and prioritize security vulnerabilities and the resulting exposure.

Expert Management

VMS delivers a highly structured set of capabilities for automating vulnerability management. Using a phased approach to initiate the service, Tata Communications helps identify an organization’s network connected assets—

subsequently categorizing and prioritizing remediation activities based on asset value and the severity of identifi ed vulnerabilities.

Automated Reporting

Tata Communications’ VMS includes automated reports delivered via the web or email to provide access to scan results, alerting IT administrators to new vulnerabilities and enabling fast response. Customized, on-demand reports can be segmented by business unit, business process or span of control for executive and technical managers’ review to meet an organization’s unique requirements. Trend reporting provides vulnerability and remediation trending by asset group and device to monitor and measure performance in remediation activities.

Scalable Architecture

VMS’ on-demand architecture leverages a self-contained scanning appliance for network integration, eliminating the need to address hardware confi guration and software management and maintenance. The simplicity and fl exibility of this architecture helps Tata Communications bring VMS online quickly, minimizing demands on an organization’s IT staff and enabling rapid results.

EnterpriseManaged Security Services

Vulnerability Management ServiceProactive security assurance

www.tatacommunications.com

2P_TC_vulnerability_management_service-ver2.0_oct-2008

For more information about Managed Security Services, please visit:www.tatacommunications.com/contact or email [email protected]

© 2008 Tata Communications Transformation Services Ltd. All Rights Reserved.

Vulnerability Management Service

Four Distinct Service Levels

Four service levels provide fl exibility for customers.

Fast Start for organizations in emerging markets with modest-sized networks and aggressive budgets that require enterprise-class vulnerability management capabilities.

Standard for enterprises that choose to manage vulnerabilities in-house, provides comprehensive capabilities but retains administrative responsibilities within the organization.

Select for enterprises that choose to have Tata Communications administer discovery, confi guration, vulnerability detection, and reporting tasks to reduce the burden on in-house IT staff.

Premium for enterprises that choose to have Tata Communications administer discovery, confi guration, vulnerability detection, and reporting tasks to reduce the burden on in-house IT staff and provide ongoing advisory services to appropriately prioritize mitigation activities.

Key Service Features

_ Network mapping provides rapid, accurate detection and identifi cation of networked assets_ Scheduled, automated discovery and internal and external scanning provide 360-degree view of networks and vulnerabilities

_ Customized scans for specifi c ports, services and/ or vulnerabilities match scanning activity to the relative importance of each device_ Customized timing of scans balances network and device bandwidth consumption against system performance requirements_ Customized reports provide comprehensive information for IT staff for rapid decision-making on remediation_ Trending and differential reporting identify assets that have higher degrees of exposure through volume or age of vulnerabilities_ Daily signature updates and checks to enable detection of newly discovered vulnerabilities_ Web-based portal provides easy access to reports _ 24X7X365 live customer support_ Multiple service levels to best address an organization’s unique requirements

Key Benefi ts

_ Proactive, early warning, security intelligence prevents unnecessary downtime_ Structured, auditable procedures detect security vulnerabilities and reduce business risk_ Turnkey deployment requires no software to install, update or maintain, and offers lowest cost of operation_ Stretches capacity of internal IT staff by outsourcing tactical but intense vulnerability assessment and research activities