Atos High Performance Security, Powered By Intel Security .

Transcription

Intelligent securityfor high performancebusinessBrochureAtos High Performance Security, powered by Intel Security:Security Transformed.

Today cybercrime and espionage operatelike any other business.They recruit the brightest talent, investheavily in R&D and in expanding their global‘distribution’ capabilities.02Trusted partner for your Digital Journey

A new approachfor a new era of cyberthreatsOrganizations today are more reliant than ever on information to achievesuccess. Information is, perhaps, your most precious business asset. And that’swhy cyber criminals are spending millions developing extremely sophisticatedattacks. It’s also why competitors and hacktivists will go to extraordinary lengthsto acquire your intellectual property.A quick glance at the news highlights the difficulties organizations of all types and sizes have inprotecting their data. The challenge lies in the fact that information security is not one of yourcore activities – but it is for the cyber attacker!Today cybercrime and espionage operate like any other business.They recruit the brightest talent, invest heavily in R&D and in expanding their global‘distribution’ capabilities. Cybercriminals can achieve their goals through Cybercrime-as-aService, a black market service that offers rapid access to pre-prepared, sophisticated malwareand techniques, including ransomware and Advanced Persistent Threats (APTs).Now is the timeto look at a newapproach to securitydelivered by a highlyexperienced partnerHow can organizations like yours hope to defend their critical data, operations and reputationsagainst a sophisticated and motivated enemy?Imagine the personnel and systems investments required just to keep up with detectingpossible cyber attack incidents, let alone creating a proactive, intelligent, real-time defence.Atos High Performance Security03

Intelligence-basedinformation securityThe cyber threat landscape is in a constant state of flux. Cyber thieves andspies already possess tools that allow them to cost-effectively developadvanced attacks and accelerate the pace of innovation. Going forward, evasiontechniques are likely to be deployed more often, helping the malware to avoiddetection. Custom-developed attacks will also be deployed more readily inorder to exploit unique vulnerabilities in an organizations systems.The key to prevent cyber attacksSo what types of threat should any security strategy take into consideration? Clearly the threat landscape is constantly evolving, yet we canmake some sound predictions about what the future may hold – and the following are likely to be in abundance:Email and SMS phishingRansomwarePoint-of-sale attacksSimple to attack, difficult to defend,easy to misuse.Can be effective in the cloud, on mobiledevices, anywhere. Difficult to prevent andeven harder to defeat.POS terminals are already under attack andthis will grow as payment types(mobile apps) expand.Insider threatsMobile malwareNon-Windows malwareEmanating from disgruntled employees,lapses in partners’ security or even data lossfrom misplaced or stolen employee devices.The proliferation of mobile devices makesmobile and BYOD an extremely richattack surface.Driven by the after effects of the Shellshockvulnerability as attackers target vulnerableUnix and Linux devices.Internet of Things attacksAdvanced Persistent Threats: Espionage & cyber warfareWill increase in order to harvest the valuabledata these connected devices gather. Theattacks will likely increase in frequency,profitability and severity.Such skirmishes will likely occur between nation states. Governments will increasingly usemalicious software to monitor the activities of persons of interest and to organise targetedattacks. Cyber criminals and business rivals will also use sophisticated attacks to spy oncommercial activities and steal intellectual property.Despite the threats and in order to be competitive, your organization cannot lock down its systems and data. The free flow of informationsupports innovation, productivity, customer experience, back-office operations – almost everything your people do every minute of the day.An intelligence-based, context-aware approach to information security is the answer – but only one that will not add to IT’s operational orbudget burden.Source: Intel Security, McAfee Labs Threat Report, November 2014 & NBC News’s myarklamiss.com, The Year in Cybersecurity: 5 Threats to Watch in 2015.04

Intel Securityhas the answerIts Security Information and Event Management technology, calledMcAfee Enterprise Security Manager (ESM) provides corporatesand public sector organizations with the ability to capture,consolidate, correlate, assess, and prioritise security events for boththird-party and Intel Security solutions in real-time.What this creates is an intelligence-based approach to informationsecurity that is ideal for today’s high performance operationalenvironment.McAfee ESM can answer multiple queries about events and activitywithin your environment. It does this by analysing network activityincluding, for example, full database sessions, alongside othercriteria such as user behaviour, device location and user roles, aswell as the content within transmitted documents. By aligning thisdata to your particular risk profile, it will assess whether certainactivities may be harmful or malicious. And it can do it in real-time,reducing time from detection to containment to mere milliseconds.The technology also links into McAfee’s global threat database,McAfee Global Threat Intelligence, to correlate suspected eventsagainst known malware signatures.McAfee’s unique Threat Intelligence Exchange technologydistributes event information to connected security technologiessuch as next generation firewalls and intrusion prevention systems,creating a crucial framework for sharing security intelligence.What makes McAfee ESM so powerful is that all this proactivemonitoring is collated and presented through a single pane of glass,where event management is logged and reporting against some 240data usage regulations is automated for you.For maximum protection, McAfee ESM scales to your needs,supporting hundreds of thousands of events per second. Asfantastic as this capability sounds, we can further enhance itscapabilities.Let’s discover how Atos High Performance Security05

A trouble shared Atos High Performance Security: Transform your securityWe selected Intel Security’s McAfee Enterprise Security Manger to power our powerful managed security service – Atos High PerformanceSecurity (AHPS).AHPS delivers a holistic approach to information security, delivered through our Assess & Design, Transform and Operate philosophy. Thanksto more than 25 years of experience delivering security solutions to our enterprise customers, we will undertake the following activities incollaboration with you:Assess & DesignTransformOperateAudits your security needs using industrybest practice to evaluate your risk profile andinformation compliance obligations and todefine the necessary controls. We will ensurewe deploy the most appropriate solution foryour particular needs.your security posture by engineering AHPSto deliver the protection and reporting yourorganizations requires. This may includeactivities such as proof of concept andsolution testingyour AHPS service for you from our state-ofthe-art Security Operations Centers (SOC)around the world.In practice, our service management methodology, illustrated below, creates a dynamic, intelligence-based feedback loop (see Figure 1). Thismeans we can build a solution that understands and adapts to your changing business requirements, analyses your particular risk profile andmonitors for abnormal behaviour so that we can respond to incidents in real-time. We also measure the effectiveness of your solution in relationto external threat intelligence and make the necessary ongoing adjustments that will keep your critical data and systems safe. By combining thismethodology with unique capabilities AHPS delivers business advantages that are simply unbeatable. These include:Peace of mindCost savingsSimplicityachieved from the knowledge that your datais being monitored and protected 24/7 by aglobal network of expert security analysts.Your team will constantly monitor yourenvironment, evaluate potential security ventsand undertake first phase investigations inorder to help block an attack.derived through the significant economies ofscale you would expect from a centralised,managed service. Could your organizationsrecruit the thousands of security personnelyou can rely on from us?we take care of every aspect of your servicefrom end-to- end, so there are no third partiesto manage and just one dedicated point ofcontact with whom to liaiseActionable securityintelligenceas a renowned systems integrator we canhelp you make the absolute most of thesecurity intelligence that our SIEM technologydelivers. By integrating it into your endpointprotection technologies we can help youcreate a robust, continuous system ofactionable security data to defend you againsteven the most sophisticated alyseBuildIdentify ‘normal’behaviourEvaluate the risk(based on scenarios)ImplementarchitectureDefine criticalityof systems & dataDefine controls(based on scenarios)Enforce securitycontrols usingtechnologyDefine security ilityAuditEnforce monitoringcontrols usingtechnologyRunRespond tothe incidentUse adopted real timerisk managementtechnologyMonitor for‘abnormal’ behaviourFigure 1With all this in mind, we are stronger together 06

Together we are strongerIn creating Atos High Performance Security, we tested many SIEM technologies, undertaking proof of concept tests, analysing results anddetermining innovation roadmaps. What sets us apart is that we have selected the very best solution in the market, McAfee Enterprise SecurityManager. It is backed by the might of Intel and, we believe, offers you unmatched capabilities and a pathway to a robust, proactive, connectedsecurity posture.Some of the world’s most prestigious organizations – our customers – would agree. They rely on Atos and Intel Security to jointly keep theircritical information and systems secure so that they can be deployed for maximum business advantage.In fact, because innovation lies at the core of our business strategy we are compelled to remain one step ahead of today’s threat actors. With thisin mind, the Atos Scientific Community, our ‘creators of change’ are involved in anticipating shifts in the global threat landscape and developingactionable thought leadership on the subject along with new and disruptive solutions to the ongoing challenge of security.With this support our customers will be empowered to safely take advantage of new technologies in order to reinvent their growth modelsand build a sustainable competitive advantage. This demonstrates our commitment to working in collaboration with all our customers, sharingoperational learnings and key security insights that will help to mitigate the risk of cyber attacks ever being successful in their environment.With over four billion people watching the 2012 Olympic Games, the London Olympic Games could afford zero security incidents. We achievedexactly that. And we did it again at Rio 2016.The Atos SIEMplatform receivedover 255 millionsyslog messagesduring theOlympicsFrom these rawmessages 4.5million significantevents wereidentifiedSIEM raisedinternal incidentsfor 5,324 of theseevents for SOCassessmentOf these internalincidents 686were raised tovenues as ticketsDuring theOlympic Gameszero securityincidentsimpacted livecompetition AtosDiscover how we can advance your security so that you can focus your onbusiness success.For more information, please contact us at security@atos.net or visitatos.net/securityAtos High Performance Security07

About AtosAbout IntelSecurityAtos SE (Societas Europaea) is a leaderin digital services with pro forma annualrevenue of circa 12 billion and circa100,000 employees in 72 countries. Servinga global client base, the Group providesConsulting & Systems Integration services,Managed Services & BPO, Cloud operations,Big Data & Cyber-security solutions, as wellas transactional services through Worldline,the European leader in the payments andtransactional services industry. With itsdeep technology expertise and industryknowledge, the Group works with clientsacross different business sectors: Defense,Financial Services, Health, Manufacturing,Media, Utilities, Public sector, Retail,Telecommunications, and Transportation.McAfee is now part of Intel Security.With its Security Connected strategy,innovative approach to hardware-enhancedsecurity, and unique McAfee Global ThreatIntelligence, Intel Security is intensely focusedon developing proactive, proven securitysolutions and services that protect systems,networks, and mobile devices for businessand personal use around the world. IntelSecurity is combining the experience andexpertise of McAfee with the innovation andproven performance of Intel to make securityan essential ingredient in every architectureand on every computing platform. Themission of Intel Security is to give everyonethe confidence to live and work safely andsecurely in the digital world.Atos is focused on business technology thatpowers progress and helps organizationsto create their firm of the future. The Groupis the Worldwide Information TechnologyPartner for the Olympic & Paralympic Gamesand is listed on the Euronext Paris market.Atos operates under the brands Atos, AtosConsulting, Atos Worldgrid, Bull, Canopy,Unify and Worldline.intelsecurity.comFind out more about usatos.netascent.atos.netCT 160808 VG Intel-security-brochureLet’s start a discussion togetherIntel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.All trademarks are the property of their respective owners. Atos, the Atos logo, Atos Codex, Atos Consulting, Atos Worldgrid, Worldline, BlueKiwi,Bull, Canopy the Open Cloud Company, Unify, Yunano, Zero Email, Zero Email Certified and The Zero Email Company are registered trademarks ofthe Atos group. Atos reserves the right to modify this document at any time without notice. Some offerings or parts of offerings described in thisdocument may not be available locally. Please contact your local Atos office for information regarding the offerings available in your country. Thisdocument does not represent a contractual commitment. September 2016. 2016 Atos

Intelligence, Intel Security is intensely focused on developing proactive, proven security solutions and services that protect systems, networks, and mobile devices for business and personal use around the world. Intel Security is combining the experience and expertise of McAfee with the innovation and proven performance of Intel to make .