SlideShare a Scribd company logo
LightSEC™
The Cloud and Mobility revolution, intensified by the quickly evolving threat landscape, heightens the
challenge for businesses to secure their IT infrastructure. Now they must fight security threats that target
their employees, applications, and other assets - not just on-premises, but throughout all of cyberspace.
The Internet has become the new IT
Enterprises and SMBs are migrating to off-premise data centers and most are already on the cloud.
Their remote-access employees have no offices, nor the resources for superior protection. So, businesses
are left with no other choice, but to outsource their IT security, just as they did for their IT data centers and
applications. This creates a unique opportunity for service providers to provide managed security services,
which supplement the communication services that they already provide.
ECI’s LightSEC solution enables service providers to become managed security service providers.
MANAGED SECURITY SERVICES
FOR SERVICE PROVIDERS
ECI’S LightSEC SOLUTION TAMES CYBER
SECURITY COMPLEXITY
Single platform
Consolidates delivery of security services for economical initial
deployment and ongoing operations.
All-Inclusive
Combines multiple security services to provide businesses with
comprehensive protection from cyber attacks.
Intuitive threat assessment
Aggregates all security events and network transaction anomalies on
a single dashboard, facilitating identification and response to attacks
and decreasing false negatives.
Single Point-of-contact
Interfaces with a trusted, long-standing vendor with solid expertise
best practices. This eliminates the need to deal with multiple
suppliers.
Best of breed
Integrates and leverages proven security applications from Check
Point® and other leading suppliers, for uncompromising security
assurance.
Future-ready
In-service upgrades keep pace with the evolving threat
landscape, providing you with peace of mind to do business.
Multi-tenant
A single cloud-based managed security service provider
(MSSP) threat detection system provides unrivaled
cost-effectiveness and ease of service delivery.
LightSEC ARCHITECTURE
LightSEC Cloud Solution comprises the following components
ECI’S LIGHTSEC CYBER
SECURITY SUITE
A rich set of mature and innovative security services
developed for today’s MSSP needs, encompassing active
threat mitigation as well as early warning threat detection and
prevention.
Among multiple network security functions, LightSEC
incorporates Check Point’s optimized network security
functions and provides a Next Generation Firewall,
breakthrough Intrusion Prevention System (IPS), URL
Filtering, Anti-Malware, and more.
LIGHTSEC-VTM
INTUITIVE
THREATASSESSMENTPLATFORM
A comprehensive threat assessment and management
platform that features an aggregated view of calculated
threats from the entire cyber security suite. LightSEC-V
also provides adaptive risk grading that correlates multiple
security functions, so that a CSO can allocate security
experts more effectively according to the apparent severity
level of the alert.
MERCURYTM
NFV DELIVERY
SOLUTION
Delivers security services as virtualized network functions
(VNFs) for ultimate deployment flexibility between
cloud-based and customer premise locations. Mercury
eliminates the dependency on diverse dedicated security
appliances.Using Commercial-Off-The-Shelf (COTS)
technology, Mercury is available as a standalone platform,
or as an integrated blade within the Neptune metro packet
transport system, and comes with full Management and
Orchestration (MANO) support.
For application flexibility, Mercury NFV implements
‘dynamic service function chaining’ to optimize risk
classification and adjust the chain of security functions
required to neutralize any given threat.
LightSEC CYBER SECURITY SUITE
The firewall controls all incoming and outgoing
network traffic by applying a designated set of rules.
Simultaneously, it provides multilayer protection
between trusted secure networks and non-trusted
networks, filtered by five security gates. Each security
gate supports intelligent security technologies suited to
a specific layer including, IPsec, NAT, header analysis,
user ID, data validation, full-session state management,
IP/Port/User-based ACL, and URL awareness. This
offering is part of ECI’s alliance with Check Point and
the solution implements their Next Generation Threat
Prevention for multilayer security protection.
IPsec secures IP communications by authenticating and
encrypting each IP packet of a communication session.
IPsec can protect data flows between a pair of hosts
(host-to-host), between a pair of security gateways
(network-to-network), or between a security gateway
and a host (network-to-host). It also supports
network-level peer authentication, data origin
authentication, data integrity, and data confidentiality
(encryption), plus replay protection.
Firewall
IPsec VPN
A real-time, behavioral-based attack mitigation
application that protects the organization infrastructure.
It prevents network and application downtime,
application vulnerability exploitation, malware spread,
network anomalies, information theft, and other
emerging cyber-attacks. It constitutes a world-class
security solution including Distributed Denial of Service
(DDoS) mitigation and SSL-based protection, to fully
protect applications and networks against known and
emerging network security threats. These include
denial of service attacks, DDoS attacks, internet pipe
saturation, attacks on login pages, attacks behind
CDNs, and SSL-based flood attacks. LightSEC DDoS
protection also includes:
•	 Protection without affecting legitimate traffic
•	 A comprehensive set of security modules
•	 Accuracy of inline or out-of-path (OOP) deployment
•	 Centralized attack management, monitoring, and
reporting.
DDoS protection
Provides application security and identity control. It
enables IT teams to create granular policies easily, based
on users or groups, to identify, block, or limit usage of
over 250,000 Web 2.0 applications and widgets.
Application Control
INTERNET-FACING ACTIVE THREAT MITIGATION
FUNDAMENTAL ACTIVE THREAT MITIGATION
Integrated with Application Control, URL filtering allows
unified enforcement and management of all aspects
of Web security. It provides optimized Web security
through full integration in the gateway to prevent
bypassing of external proxies; integration of policy
enforcement with Application Control for full Web and
Web 2.0 protection; and UserCheck, which empowers
and educates users on Web usage policy in real time.
URL Filtering

Recommended for you

SCADA Security Training
SCADA Security TrainingSCADA Security Training
SCADA Security Training

For what reason would it be advisable for you to pick TONEX for your SCADA Security Training? SCADA Security Training course gives progressed SCADA specialized outline of the developing patterns, propelled applications, activities, administration and security. We have Providing SCADA and Automation and Security Training and counseling for more than 15 years with 20+ man-long periods of improvement encounter. SCADA Security Training course covers all parts of Industrial Control System (ICS) security for a few kinds of control frameworks including: Supervisory Control and Data Acquisition (SCADA) frameworks, Distributed Control Systems (DCS) and Other control framework arrangements, for example, slide mounted Programmable Logic Controllers (PLC). #Some of the highlights of the SCADA Security Training: Understand concepts behind Industrial Control Systems (ICS) and SCADA Security Learn  about DCS, SCADA and Industrial Control Systems technology, Infrastructure, instrumentation, HMI and Data Historians SCADA and ICS Characteristics, Threats and Vulnerabilities SCADA and ICS Security Program Development and Deployment SCADA Network Architecture SCADA Security Controls Learn Passive and Active Techniques Explore the impact of Wireless communications on  SCADA System Security Testing Explore SCADA System Security Testing with Active Techniques Understand SCADA vulnerabilities  and different  techniques behind exploiting SCADA Systems Understand how SCADA defense techniques and procedures work Identify the weak links and challenges in SCADA cybersecurity Review the available solutions and standards for secure SCADA architectures Examine the state of policies on data privacy and Internet security and their impact on SCADA Define a “To Do” list of action items to secure the SCADA systems ICS/SCADA Security Essentials Essentials for NERC Critical Infrastructure Protection ICS Active Defense and Incident Response Assessing and Exploiting SCADA and Control Systems Critical Infrastructure and Control System Cybersecurity SCADA Security Management #Learn more about the following aspects of SCADA, ICS and DCS Security: Understanding Control System Vulnerabilities Understanding and Identifying SCADA and ICS Vulnerabilities SCADA, Industrial Control System (ICS) and Distributed Control Systems (DCS) Exploitation Securing and Protecting Industrial Control Systems (ICS) ICS, DCS and PLC Penetration Testing, Exploiting and Vulnerability Assessments Hacking SCADA using Nmap, Nessus and Metasploit Hacking Remote Web Servers SCADA SQL Injection Attack Learn more about SCADA security training SCADA Security Training https://www.tonex.com/training-courses/scada-security-training/

scada security trainingscadascada training
Axxera ci siem
Axxera ci siemAxxera ci siem
Axxera ci siem

Axxera Central Intelligence SIEM is an ITIL process driven security information and event management (SIEM) platform that collects, analyzes, and correlates security events across an organization. It uses intelligent correlation to detect anomalies and security threats. The platform generates tickets for any high-risk events according to ITIL standards and integrates tightly with the organization's security processes and procedures to proactively mitigate risks.

Presentacion nac
Presentacion nacPresentacion nac
Presentacion nac

This document discusses securing branch offices with Cisco Network Admission Control (NAC). It begins by describing the new realities of branch offices, including increased mobility, bandwidth needs, and blended security threats. It then discusses how Cisco NAC can authenticate devices, scan for compliance with policies, quarantine noncompliant devices, and help with remediation. Finally, it describes how Cisco NAC network modules can be deployed on Cisco integrated services routers to provide NAC capabilities in branch office environments.

Anti-bot detects bot-infected machines and prevents
bot damage by blocking bot command and control
communications. Anti-virus uses virus signatures and
anomaly recognition to block malicious files at the
gateway before they can affect users. Continual updates
from ThreatCloud, the first collaborative network to
fight cybercrime, ensure the latest available protection
measures from the ever-evolving threat landscape.
Anti-Bot and Anti-Virus
Eliminates malware contained in emails and
web-downloaded documents. It removes exploitable
content (including active content and various embedded
objects) and reconstructs files using known, safe elements.
Provides comprehensive protection for the
organization’s messaging infrastructure. A
multidimensional approach delivers highly accurate
spam protection and defends organizations from a wide
variety of virus and malware threat attempts via email.
Continual updates assure interception of all threats
before they spread.
Threat Extraction
Anti-Spam and Email Security
This breach detection and remediation solution
comprises one or more network applications (physical
appliances and/or virtualized delivery) together with
software modules. These connect passively to the primary
switches of your internal network, find compromised
endpoints and stolen credentials proactively, and then
proceed to flag and remediate them. The solution works
in a three-step iterative process to identify and mitigate
attacks, as follows:
•	Detect - The application passively monitors
network traffic and profiles the behavior of each
user/endpoint. Without requiring any configuration
or signatures, it detects subtle deviations in the
network, based on analysis of network behavior and
gathered historical KPIs.
•	 Illuminate - Further investigates traffic anomalies,
automatically scans suspected traffic, and collects
host-level indicators to identify the origin of
suspicious activities. This unique network-centric
detection and analysis, augmented by cloud-based
threat intelligence, provides your security team with
actionable incidents with an extremely low false-
positive rate.
Network Anomaly Detection
EARLY WARNING THREAT DETECTION AND PREVENTION
•	 Remediate - The actionable information generated
for each breached system enables efficient triage
and remediation. The solution purposely keeps
the number of alarms (and false positives) to a low
manageable number, so that security officers can
mitigate breaches efficiently and quickly. This can be
executed early in the attack life cycle, before any real
damage is done.
Big Data Cyber Analytics detect patterns that may
indicate malicious users and trends, to prompt action
before a problem occurs. Similar to Network Anomaly
Detection traffic analysis, Big Data Cyber Analytics
analyzes information over time, including log files of
user behavior, flagged information from deep packet
inspection (DPI), and other data feeds. It employs
sophisticated big-data machine learning without
predefined rules, signatures, or heuristics.
Big Data Cyber Analytics
LightSEC-VTM
INTUITIVETHREATASSESSMENTPLATFORM
REAL-TIME THREAT MANAGEMENT FOR REAL-TIME SECURITY
Security challenges in today’s organization environment are diverse. Threats to critical systems exist in both IT and OT
(Operations Technology) environments on all protocol levels. The sheer amount of notifications, systems, and alarms cause
false positives and increases the chance of a successful breach or attack.
KEY ADVANTAGES
Unified Dashboard gathers relevant data, events, and incidents from network and security systems, and from all layers. It :
•	 Shows the ‘big picture’ by presenting an updated cyber status of your environment
•	 Delivers centralized real-time cyber reports and notifications
•	 Offers visibility from any device, including mobile phones and tablets
Aggregated Events Analysis from multiple security subsystems and cyber engines are graded into significant main alerts to:
•	 Allow drill-down and simple navigation to discover and pinpoint root causes
•	 Supply an automatic learning engine with no need for signature updates or pre-defined heuristics
•	 Provide a smooth flow of information between primary and sub-systems (on the GUI dashboard)
Calculated threats presented in a user-friendly manner
Centralized real-time view of the IT cyber security status combined with the operations network
Future-proof growth flexibility by adding/removing third-party widgets and aggregated components
LightSEC-V addresses these challenges by displaying all
critical information on a single dashboard, which enables
security managers to pinpoint the sources of attack. It provides
‘at-a-glance’ aggregated views of calculated threats from
multiple security functions and probes. LightSEC-V presents
a clear picture of all detected security threats throughout the
entire network, including production and operations networks.
The result is dependable prevention of attacks and breaches
before they cause downtime or damage.
ABOUT ECI
ECI is a global provider of ELASTIC network solutions to CSPs, utilities as well as data center operators. Along with
its long-standing, industry-proven packet-optical transport, ECI offers a variety of SDN/NFV applications, end-to-end
network management, a comprehensive cyber security solution, and a range of professional services. ECI's ELASTIC
solutions ensure open, future-proof, and secure communications. With ECI, customers have the luxury of choosing a
network that can be tailor-made to their needs today – while being flexible enough to evolve with the changing needs
of tomorrow. For more information, visit us at www.ecitele.com
Contact us to discover how ECI’s holistic LightSEC solution can secure your business
Copyright©2016ECI.Allrightsreserved.Informationinthisdocumentissubjecttochangewithoutnotice.ECIassumesnoresponsibilityforanyerrorsthatmayappearinthisdocument.

More Related Content

What's hot

Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
Priyanka Aash
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
technext1
 
Best Practices for Network Security Management
Best Practices for Network Security Management Best Practices for Network Security Management
Best Practices for Network Security Management
Skybox Security
 
SCADA Security Training
SCADA Security TrainingSCADA Security Training
SCADA Security Training
Bryan Len
 
Axxera ci siem
Axxera ci siemAxxera ci siem
Axxera ci siem
Reddy Marri
 
Presentacion nac
Presentacion nacPresentacion nac
Presentacion nac
Adriana Cardona
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Cisco Security
 
IBM Security Intelligence
IBM Security IntelligenceIBM Security Intelligence
IBM Security Intelligence
Anna Landolfi
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- Insurance
Priyanka Aash
 
Overview of Google’s BeyondCorp Approach to Security
 Overview of Google’s BeyondCorp Approach to Security Overview of Google’s BeyondCorp Approach to Security
Overview of Google’s BeyondCorp Approach to Security
Priyanka Aash
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
Cisco Service Provider
 
Watchguard short introduction
Watchguard short introductionWatchguard short introduction
Watchguard short introduction
Jimmy Saigon
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco Service Provider
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?
Mir Mustafa Ali
 
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated DesignCisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Russia
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security Intelligence
Camilo Fandiño Gómez
 
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
Amazon Web Services
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
WPICPE
 
SKIRE HOSTING SERVICES
SKIRE HOSTING SERVICESSKIRE HOSTING SERVICES
SKIRE HOSTING SERVICES
webhostingguy
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentation
Rasool Irfan
 

What's hot (20)

Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
Best Practices for Network Security Management
Best Practices for Network Security Management Best Practices for Network Security Management
Best Practices for Network Security Management
 
SCADA Security Training
SCADA Security TrainingSCADA Security Training
SCADA Security Training
 
Axxera ci siem
Axxera ci siemAxxera ci siem
Axxera ci siem
 
Presentacion nac
Presentacion nacPresentacion nac
Presentacion nac
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
 
IBM Security Intelligence
IBM Security IntelligenceIBM Security Intelligence
IBM Security Intelligence
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- Insurance
 
Overview of Google’s BeyondCorp Approach to Security
 Overview of Google’s BeyondCorp Approach to Security Overview of Google’s BeyondCorp Approach to Security
Overview of Google’s BeyondCorp Approach to Security
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
 
Watchguard short introduction
Watchguard short introductionWatchguard short introduction
Watchguard short introduction
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?
 
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated DesignCisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security Intelligence
 
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
 
SKIRE HOSTING SERVICES
SKIRE HOSTING SERVICESSKIRE HOSTING SERVICES
SKIRE HOSTING SERVICES
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentation
 

Viewers also liked

Connected Urban Transportation Solutions
Connected Urban Transportation SolutionsConnected Urban Transportation Solutions
Connected Urban Transportation Solutions
George Wainblat
 
Drama genre of film
Drama genre of filmDrama genre of film
Drama genre of film
frankieb08
 
Light sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperLight sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paper
George Wainblat
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
George Wainblat
 
radarfinalADCA
radarfinalADCAradarfinalADCA
radarfinalADCA
PRASAN KUMAR MISHRA
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
George Wainblat
 
Healthcare Assets Management Solution
Healthcare Assets Management SolutionHealthcare Assets Management Solution
Healthcare Assets Management Solution
George Wainblat
 
Browsing the web from a train
Browsing the web from a trainBrowsing the web from a train
Browsing the web from a train
George Wainblat
 
Poster Compositions
Poster CompositionsPoster Compositions
Poster Compositions
frankieb08
 
Ekonomi regional
Ekonomi regionalEkonomi regional
Ekonomi regional
alfitrorekwendi93
 
I. Bobko_Buyer-Expeditor
I. Bobko_Buyer-ExpeditorI. Bobko_Buyer-Expeditor
I. Bobko_Buyer-Expeditor
Igor Bobko
 
ACQA conference 4 November 2016
ACQA conference 4 November 2016ACQA conference 4 November 2016
ACQA conference 4 November 2016
toptentips
 

Viewers also liked (12)

Connected Urban Transportation Solutions
Connected Urban Transportation SolutionsConnected Urban Transportation Solutions
Connected Urban Transportation Solutions
 
Drama genre of film
Drama genre of filmDrama genre of film
Drama genre of film
 
Light sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperLight sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paper
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
 
radarfinalADCA
radarfinalADCAradarfinalADCA
radarfinalADCA
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 
Healthcare Assets Management Solution
Healthcare Assets Management SolutionHealthcare Assets Management Solution
Healthcare Assets Management Solution
 
Browsing the web from a train
Browsing the web from a trainBrowsing the web from a train
Browsing the web from a train
 
Poster Compositions
Poster CompositionsPoster Compositions
Poster Compositions
 
Ekonomi regional
Ekonomi regionalEkonomi regional
Ekonomi regional
 
I. Bobko_Buyer-Expeditor
I. Bobko_Buyer-ExpeditorI. Bobko_Buyer-Expeditor
I. Bobko_Buyer-Expeditor
 
ACQA conference 4 November 2016
ACQA conference 4 November 2016ACQA conference 4 November 2016
ACQA conference 4 November 2016
 

Similar to Light sec for service providers brochure

fortigate-200f-series (1).pdffortigate-200f-series (1).pdf
fortigate-200f-series (1).pdffortigate-200f-series (1).pdffortigate-200f-series (1).pdffortigate-200f-series (1).pdf
fortigate-200f-series (1).pdffortigate-200f-series (1).pdf
ChristianSilva166877
 
Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutions
Alan Rudd
 
Product brochure-print-spread
Product brochure-print-spreadProduct brochure-print-spread
Product brochure-print-spread
Tran Thi Thuy Tuyet
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
Metaorange
 
Simplify Your Security with Cybowall
Simplify Your Security with CybowallSimplify Your Security with Cybowall
Simplify Your Security with Cybowall
Idan Tohami
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
Metaorange
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
ahmed53254
 
Cisco NGFW AMP
Cisco NGFW AMPCisco NGFW AMP
Cisco NGFW AMP
Cisco Canada
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
International Communications Corporation
 
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
IJCNCJournal
 
TACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentTACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN Environment
Saikat Chaudhuri
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
laonap166
 
Ixia/Net Optics - Visibility Architecture Solution Brief
Ixia/Net Optics - Visibility Architecture Solution BriefIxia/Net Optics - Visibility Architecture Solution Brief
Ixia/Net Optics - Visibility Architecture Solution Brief
Network Performance Channel GmbH
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions
Thierry Matusiak
 
brochure-triton-ap-web-en
brochure-triton-ap-web-enbrochure-triton-ap-web-en
brochure-triton-ap-web-en
Lee Dalton
 
Prevoty Integri Datasheet
Prevoty Integri DatasheetPrevoty Integri Datasheet
Prevoty Integri Datasheet
Prevoty
 
Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That Works
Brett L. Scott
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
MBMeHealthCareSolutions
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
David Patterson
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
Cisco Russia
 

Similar to Light sec for service providers brochure (20)

fortigate-200f-series (1).pdffortigate-200f-series (1).pdf
fortigate-200f-series (1).pdffortigate-200f-series (1).pdffortigate-200f-series (1).pdffortigate-200f-series (1).pdf
fortigate-200f-series (1).pdffortigate-200f-series (1).pdf
 
Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutions
 
Product brochure-print-spread
Product brochure-print-spreadProduct brochure-print-spread
Product brochure-print-spread
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
Simplify Your Security with Cybowall
Simplify Your Security with CybowallSimplify Your Security with Cybowall
Simplify Your Security with Cybowall
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Cisco NGFW AMP
Cisco NGFW AMPCisco NGFW AMP
Cisco NGFW AMP
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
 
TACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentTACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN Environment
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
Ixia/Net Optics - Visibility Architecture Solution Brief
Ixia/Net Optics - Visibility Architecture Solution BriefIxia/Net Optics - Visibility Architecture Solution Brief
Ixia/Net Optics - Visibility Architecture Solution Brief
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions
 
brochure-triton-ap-web-en
brochure-triton-ap-web-enbrochure-triton-ap-web-en
brochure-triton-ap-web-en
 
Prevoty Integri Datasheet
Prevoty Integri DatasheetPrevoty Integri Datasheet
Prevoty Integri Datasheet
 
Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That Works
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 

Recently uploaded

Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
Mark Billinghurst
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Bert Blevins
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
shanthidl1
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
jackson110191
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
huseindihon
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
Enterprise Wired
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
Stephanie Beckett
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
BookNet Canada
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
Bert Blevins
 
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Erasmo Purificato
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
Adam Dunkels
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
Vijayananda Mohire
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
SynapseIndia
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
Larry Smarr
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
Yevgen Sysoyev
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
Aurora Consulting
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
Lidia A.
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Mydbops
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
KAMAL CHOUDHARY
 

Recently uploaded (20)

Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
 
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
 

Light sec for service providers brochure

  • 1. LightSEC™ The Cloud and Mobility revolution, intensified by the quickly evolving threat landscape, heightens the challenge for businesses to secure their IT infrastructure. Now they must fight security threats that target their employees, applications, and other assets - not just on-premises, but throughout all of cyberspace. The Internet has become the new IT Enterprises and SMBs are migrating to off-premise data centers and most are already on the cloud. Their remote-access employees have no offices, nor the resources for superior protection. So, businesses are left with no other choice, but to outsource their IT security, just as they did for their IT data centers and applications. This creates a unique opportunity for service providers to provide managed security services, which supplement the communication services that they already provide. ECI’s LightSEC solution enables service providers to become managed security service providers. MANAGED SECURITY SERVICES FOR SERVICE PROVIDERS
  • 2. ECI’S LightSEC SOLUTION TAMES CYBER SECURITY COMPLEXITY Single platform Consolidates delivery of security services for economical initial deployment and ongoing operations. All-Inclusive Combines multiple security services to provide businesses with comprehensive protection from cyber attacks. Intuitive threat assessment Aggregates all security events and network transaction anomalies on a single dashboard, facilitating identification and response to attacks and decreasing false negatives. Single Point-of-contact Interfaces with a trusted, long-standing vendor with solid expertise best practices. This eliminates the need to deal with multiple suppliers. Best of breed Integrates and leverages proven security applications from Check Point® and other leading suppliers, for uncompromising security assurance. Future-ready In-service upgrades keep pace with the evolving threat landscape, providing you with peace of mind to do business. Multi-tenant A single cloud-based managed security service provider (MSSP) threat detection system provides unrivaled cost-effectiveness and ease of service delivery.
  • 3. LightSEC ARCHITECTURE LightSEC Cloud Solution comprises the following components ECI’S LIGHTSEC CYBER SECURITY SUITE A rich set of mature and innovative security services developed for today’s MSSP needs, encompassing active threat mitigation as well as early warning threat detection and prevention. Among multiple network security functions, LightSEC incorporates Check Point’s optimized network security functions and provides a Next Generation Firewall, breakthrough Intrusion Prevention System (IPS), URL Filtering, Anti-Malware, and more. LIGHTSEC-VTM INTUITIVE THREATASSESSMENTPLATFORM A comprehensive threat assessment and management platform that features an aggregated view of calculated threats from the entire cyber security suite. LightSEC-V also provides adaptive risk grading that correlates multiple security functions, so that a CSO can allocate security experts more effectively according to the apparent severity level of the alert. MERCURYTM NFV DELIVERY SOLUTION Delivers security services as virtualized network functions (VNFs) for ultimate deployment flexibility between cloud-based and customer premise locations. Mercury eliminates the dependency on diverse dedicated security appliances.Using Commercial-Off-The-Shelf (COTS) technology, Mercury is available as a standalone platform, or as an integrated blade within the Neptune metro packet transport system, and comes with full Management and Orchestration (MANO) support. For application flexibility, Mercury NFV implements ‘dynamic service function chaining’ to optimize risk classification and adjust the chain of security functions required to neutralize any given threat.
  • 4. LightSEC CYBER SECURITY SUITE The firewall controls all incoming and outgoing network traffic by applying a designated set of rules. Simultaneously, it provides multilayer protection between trusted secure networks and non-trusted networks, filtered by five security gates. Each security gate supports intelligent security technologies suited to a specific layer including, IPsec, NAT, header analysis, user ID, data validation, full-session state management, IP/Port/User-based ACL, and URL awareness. This offering is part of ECI’s alliance with Check Point and the solution implements their Next Generation Threat Prevention for multilayer security protection. IPsec secures IP communications by authenticating and encrypting each IP packet of a communication session. IPsec can protect data flows between a pair of hosts (host-to-host), between a pair of security gateways (network-to-network), or between a security gateway and a host (network-to-host). It also supports network-level peer authentication, data origin authentication, data integrity, and data confidentiality (encryption), plus replay protection. Firewall IPsec VPN A real-time, behavioral-based attack mitigation application that protects the organization infrastructure. It prevents network and application downtime, application vulnerability exploitation, malware spread, network anomalies, information theft, and other emerging cyber-attacks. It constitutes a world-class security solution including Distributed Denial of Service (DDoS) mitigation and SSL-based protection, to fully protect applications and networks against known and emerging network security threats. These include denial of service attacks, DDoS attacks, internet pipe saturation, attacks on login pages, attacks behind CDNs, and SSL-based flood attacks. LightSEC DDoS protection also includes: • Protection without affecting legitimate traffic • A comprehensive set of security modules • Accuracy of inline or out-of-path (OOP) deployment • Centralized attack management, monitoring, and reporting. DDoS protection Provides application security and identity control. It enables IT teams to create granular policies easily, based on users or groups, to identify, block, or limit usage of over 250,000 Web 2.0 applications and widgets. Application Control INTERNET-FACING ACTIVE THREAT MITIGATION FUNDAMENTAL ACTIVE THREAT MITIGATION Integrated with Application Control, URL filtering allows unified enforcement and management of all aspects of Web security. It provides optimized Web security through full integration in the gateway to prevent bypassing of external proxies; integration of policy enforcement with Application Control for full Web and Web 2.0 protection; and UserCheck, which empowers and educates users on Web usage policy in real time. URL Filtering
  • 5. Anti-bot detects bot-infected machines and prevents bot damage by blocking bot command and control communications. Anti-virus uses virus signatures and anomaly recognition to block malicious files at the gateway before they can affect users. Continual updates from ThreatCloud, the first collaborative network to fight cybercrime, ensure the latest available protection measures from the ever-evolving threat landscape. Anti-Bot and Anti-Virus Eliminates malware contained in emails and web-downloaded documents. It removes exploitable content (including active content and various embedded objects) and reconstructs files using known, safe elements. Provides comprehensive protection for the organization’s messaging infrastructure. A multidimensional approach delivers highly accurate spam protection and defends organizations from a wide variety of virus and malware threat attempts via email. Continual updates assure interception of all threats before they spread. Threat Extraction Anti-Spam and Email Security This breach detection and remediation solution comprises one or more network applications (physical appliances and/or virtualized delivery) together with software modules. These connect passively to the primary switches of your internal network, find compromised endpoints and stolen credentials proactively, and then proceed to flag and remediate them. The solution works in a three-step iterative process to identify and mitigate attacks, as follows: • Detect - The application passively monitors network traffic and profiles the behavior of each user/endpoint. Without requiring any configuration or signatures, it detects subtle deviations in the network, based on analysis of network behavior and gathered historical KPIs. • Illuminate - Further investigates traffic anomalies, automatically scans suspected traffic, and collects host-level indicators to identify the origin of suspicious activities. This unique network-centric detection and analysis, augmented by cloud-based threat intelligence, provides your security team with actionable incidents with an extremely low false- positive rate. Network Anomaly Detection EARLY WARNING THREAT DETECTION AND PREVENTION • Remediate - The actionable information generated for each breached system enables efficient triage and remediation. The solution purposely keeps the number of alarms (and false positives) to a low manageable number, so that security officers can mitigate breaches efficiently and quickly. This can be executed early in the attack life cycle, before any real damage is done. Big Data Cyber Analytics detect patterns that may indicate malicious users and trends, to prompt action before a problem occurs. Similar to Network Anomaly Detection traffic analysis, Big Data Cyber Analytics analyzes information over time, including log files of user behavior, flagged information from deep packet inspection (DPI), and other data feeds. It employs sophisticated big-data machine learning without predefined rules, signatures, or heuristics. Big Data Cyber Analytics
  • 6. LightSEC-VTM INTUITIVETHREATASSESSMENTPLATFORM REAL-TIME THREAT MANAGEMENT FOR REAL-TIME SECURITY Security challenges in today’s organization environment are diverse. Threats to critical systems exist in both IT and OT (Operations Technology) environments on all protocol levels. The sheer amount of notifications, systems, and alarms cause false positives and increases the chance of a successful breach or attack. KEY ADVANTAGES Unified Dashboard gathers relevant data, events, and incidents from network and security systems, and from all layers. It : • Shows the ‘big picture’ by presenting an updated cyber status of your environment • Delivers centralized real-time cyber reports and notifications • Offers visibility from any device, including mobile phones and tablets Aggregated Events Analysis from multiple security subsystems and cyber engines are graded into significant main alerts to: • Allow drill-down and simple navigation to discover and pinpoint root causes • Supply an automatic learning engine with no need for signature updates or pre-defined heuristics • Provide a smooth flow of information between primary and sub-systems (on the GUI dashboard) Calculated threats presented in a user-friendly manner Centralized real-time view of the IT cyber security status combined with the operations network Future-proof growth flexibility by adding/removing third-party widgets and aggregated components LightSEC-V addresses these challenges by displaying all critical information on a single dashboard, which enables security managers to pinpoint the sources of attack. It provides ‘at-a-glance’ aggregated views of calculated threats from multiple security functions and probes. LightSEC-V presents a clear picture of all detected security threats throughout the entire network, including production and operations networks. The result is dependable prevention of attacks and breaches before they cause downtime or damage. ABOUT ECI ECI is a global provider of ELASTIC network solutions to CSPs, utilities as well as data center operators. Along with its long-standing, industry-proven packet-optical transport, ECI offers a variety of SDN/NFV applications, end-to-end network management, a comprehensive cyber security solution, and a range of professional services. ECI's ELASTIC solutions ensure open, future-proof, and secure communications. With ECI, customers have the luxury of choosing a network that can be tailor-made to their needs today – while being flexible enough to evolve with the changing needs of tomorrow. For more information, visit us at www.ecitele.com Contact us to discover how ECI’s holistic LightSEC solution can secure your business Copyright©2016ECI.Allrightsreserved.Informationinthisdocumentissubjecttochangewithoutnotice.ECIassumesnoresponsibilityforanyerrorsthatmayappearinthisdocument.