SlideShare ist ein Scribd-Unternehmen logo
1 von 5
4162425-111760Capabilities Statement General Overview SecureWorks is an independent Information Security Services Provider, focused solely on the delivery of best-of-breed, FISMA compliant, vendor-neutral security services. Recognized as a leader in the IT security industry, SecureWorks provides security infrastructure monitoring, management and consulting offerings to help Federal Clients reduce risk to assets and defend against the ongoing threat to networks and systems present in today’s internetworked environment. SecureWorks is the leading “Security as a Service” provider safeguarding over 2,700 organizations. SecureWorks, focuses exclusively on security services, and is positioned in the Leader's Quadrant in Gartner's Magic Quadrant for Managed Security Services Providers (MSSPs). We protect SecureWorks clients through a combination of a purpose-built, on-demand Security Management platform, applied research from the SecureWorks Counter Threat Unit™ and 24x7 monitoring and management by an analysis team of SANS GIAC-certified experts. Why SecureWorks? Gain a Trusted Security Partner for FISMA Compliance SecureWorks is a vendor neutral provider focused solely on securing critical assets. SecureWorks data collection and unparalleled reporting capability provide assistance with compliance to NIST 800-53. SecureWorks’ certified, experienced Security Operations Center staff serves as an extension of agency security teams, providing objective security advice and unlimited consultation. And, in addition to supporting the FISMA compliance process, Information Security Services from SecureWorks will provide “Best In Class Protection”  as it relates to Cyber-Security while lowering your costs. Established Federal Government Service Provider  SecureWorks provides Information Security Services to a variety of federal agency clients through relationships with IT management and IT security focused prime contractors. As a validated federal supplier and subcontractor, SecureWorks can fully deploy services in a matter of days from contract award.  Unparalleled Internal and External Threat Visibility SecureWorks leverages the visibility gained from monitoring billions of security events everyday across more than 2,000 clients located throughout the world to deliver proactive protection. SecureWorks global visibility enables its CTU (Counter Threat Unit) research team to identify emerging threats as they arise and establish countermeasures to keep critical agency information assets secured. Industry-Leading Client Portal With robust security and compliance reporting capabilities, the SecureWorks Portal is recognized by industry analysts and clients alike as the premier client portal in the marketplace. The Portal provides comprehensive enterprise security vision and service transparency, facilitating the partnership required for effective threat and vulnerability management. The Portal is a powerful yet easy-to-use feature of SecureWorks’ services that delivers tremendous value to agency security teams by providing comprehensive reporting and compliance data and visibility to security events and incidents. Integrated and Advanced Technology Platform SecureWorks proprietary, purpose-built Sherlock Security Management Platform enables services to be tailored to specific agency requirements. Sherlock has tremendous scalability, processing billions of security events every day across the SecureWorks client base. Capable of monitoring virtually any security technology or critical information asset, the Platform provides SecureWorks’ Security Analysts with maximum security context for full, in-depth analysis while virtually eliminating false positives. Services Overview Professional Services SecureWorks' Professional Services provide expertise and analysis to help IT security managers to improve the agency’s security posture, facilitate compliance, and improve operational efficiency. With deep experience in industry regulations and standards, SecureWorks’ security professionals identify risk to prepare for a favorable audit of agency IT security controls. SecureWorks’ Professional Services include: Compliance: FISMA, SOX, NERC CIP, NISPOM Risk Assessment Penetration Testing Incident Handling and Forensics Web Application Testing Business Impact Analysis Policy Development SIM On-Demand SecureWorks’ SIM On-Demand Service allows organizations to attain all the benefits of traditional SIM software, without experiencing any of the drawbacks. SecureWorks’ SIM On-Demand Service delivers event aggregation, correlation and reporting “in-the-cloud,” requiring no lengthy software implementations. The SIM On-Demand service can be up and running in a matter of days, immediately presenting your agency’s IT security team with actionable information, a consolidated view of the security status of critical assets and on-demand compliance reports via the secure web-based SecureWorks Portal. Service features include: Rapid implementation and no management overhead Vendor neutral, infrastructure-wide event aggregation and advanced correlation Asset classification, remediation workflow and 24x7 access to SecureWorks’ security experts On-demand security and compliance reports through the SecureWorks real-time client Portal Security Monitoring SecureWorks’ Security Monitoring Service provides 24x7x365 vigilance over your agency’s critical information assets. SecureWorks’ Security Analysts will monitor, analyze and respond to security events from security devices, network infrastructure, servers, databases, applications or any other critical information asset in real-time. Service features: Expert analysis by SecureWorks’ 100% GIAC certified team of Security Analysts Vendor neutral, infrastructure-wide coverage Real-time, 24x7 monitoring, correlation and incident response On-demand security and compliance reports through the SecureWorks real-time client Portal SecureWorks recommends the Security Monitoring service for all critical security or information assets that require 24x7x365 monitoring by experienced security professionals.  This may include firewalls, IDS/IPS, VPNs, routers, web servers, databases, applications and any other high-value asset.  SecureWorks can monitor virtually any security device or critical information asset and perform full correlation and analysis across the agency’s enterprise systems to detect threats to assets. Managed Network Intrusion Detection/Prevention  SecureWorks provides 24x7x365 monitoring and full lifecycle management of your agency’s IDS/IPS infrastructure. SecureWorks provides proactive management and real-time security event monitoring and analysis across the Network Intrusion Prevention and Detection infrastructure. SecureWorks’ award-winning Managed Network Intrusion Prevention and Detection Service can support the agency’s current and future best-of-breed environment, as well as provide superior protection in a cost-effective technology and service bundle. This service is delivered in a co-managed fashion, where the agency’s IT security management team retains ownership and administrative access to the devices while SecureWorks performs all management and monitoring activities. Features of this service include:  24x7x365 real-time monitoring by 100% GIAC certified security experts Real-time blocking of malicious Internet activity before compromise Proactive administration, signature tuning and maintenance Countermeasure deployment based on SecureWorks’ industry-leading threat visibility On-demand security, board-level and compliance reports  Managed Firewall  SecureWorks provides 24x7x365 management and monitoring of your agency’s firewall and gateway appliance infrastructure. SecureWorks’ experts provide scoping, deployment, policy configuration and ongoing management of supported firewall devices. SecureWorks’ managed firewall and VPN services provide the 24x7 expertise needed to enhance the agency’s security posture, improve operational efficiency and reduce the costs associated with implementing and maintaining firewall and VPN devices. Managed Firewall service is delivered in a co-managed fashion where the agency’s IT security management team retains ownership and administrative rights to the devices. This service includes:    Site assessment and firewall policy design Firewall installation, configuration and maintenance Total lifecycle management including performance and troubleshooting 24x7 firewall monitoring to detect known and unknown threats Concise easy to understand reporting Managed Host Intrusion Prevention SecureWorks’ Managed Host Intrusion Prevention Service protects your agency’s network from attacks that can damage applications, data, or the underlying operating system. This service delivers protection at the host level by blocking behavior that signals malicious activity. This service includes: Real-time behavior-based attack blocking Protection against attacks that bypass perimeter security Policy set management, automatic updates and all other maintenance 24x7x365 real-time monitoring and response Comprehensive reporting Vulnerability Scanning SecureWorks' Vulnerability Scanning Service identifies exposures and weak spots within your agency’s network through powerful internal and external scanning. As a client-driven service, IT security managers have full control of scanning parameters and scheduling through the SecureWorks Portal. Service features include: Internal and external scanning  Scanning of all 65,000 ports (not just the first 16,000) Prioritized remediation and trending information On-demand security and compliance reports Threat Intelligence SecureWorks' Threat Intelligence delivers early warnings about emerging threats and actionable security intelligence tailored to your agency’s environment, providing more time to protect critical assets. The industry-leading SecureWorks CTU aggregates threats and vulnerabilities, accurately assesses severity levels and provides IT security managers with the steps needed to remediate these issues before they impact the agency’s IT environment.  The threat intelligence service streamlines the vulnerability research and security intelligence process in order to provide clients with more time to protect their critical information assets. Service features include: Actionable information tailored to the agency’s environment  Early warnings to emerging threats  Clear, concise threat and vulnerability analyses  Remediation information  Unlimited consultation with SecureWorks’ industry recognized security researchers  Purchasing Information Contact for all Federal agency and Contractor inquiries: Justin DuHaime Director, Business Development, Federal Government (202) 903-0088 jduhaime@secureworks.com
SecureWorks
SecureWorks
SecureWorks
SecureWorks

Weitere ähnliche Inhalte

Was ist angesagt?

Modern vs. Traditional SIEM
Modern vs. Traditional SIEM Modern vs. Traditional SIEM
Modern vs. Traditional SIEM Alert Logic
 
Siem solutions R&E
Siem solutions R&ESiem solutions R&E
Siem solutions R&EOwais Ahmad
 
LTS Secure SIEM Features
LTS Secure SIEM Features LTS Secure SIEM Features
LTS Secure SIEM Features rver21
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution hashnees
 
Intelligence driven SOC as a Service
Intelligence driven SOC as a ServiceIntelligence driven SOC as a Service
Intelligence driven SOC as a Servicerver21
 
LTS Secure intelligence driven security operation center
LTS Secure intelligence driven security operation centerLTS Secure intelligence driven security operation center
LTS Secure intelligence driven security operation centerrver21
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation finalRizwan S
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsOWASP Delhi
 
Top Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemTop Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemSBWebinars
 
SIEM (Security Information and Event Management)
SIEM (Security Information and Event Management)SIEM (Security Information and Event Management)
SIEM (Security Information and Event Management)Osama Ellahi
 
Gartner_Critical Capabilities for SIEM 9.21.15
Gartner_Critical Capabilities for SIEM 9.21.15Gartner_Critical Capabilities for SIEM 9.21.15
Gartner_Critical Capabilities for SIEM 9.21.15Jay Steidle
 
Force 3 Software Practice Overview
Force 3 Software Practice OverviewForce 3 Software Practice Overview
Force 3 Software Practice OverviewForce 3
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...Raffael Marty
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveAlgoSec
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)k33a
 

Was ist angesagt? (18)

Modern vs. Traditional SIEM
Modern vs. Traditional SIEM Modern vs. Traditional SIEM
Modern vs. Traditional SIEM
 
Siem solutions R&E
Siem solutions R&ESiem solutions R&E
Siem solutions R&E
 
LTS Secure SIEM Features
LTS Secure SIEM Features LTS Secure SIEM Features
LTS Secure SIEM Features
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution
 
Intelligence driven SOC as a Service
Intelligence driven SOC as a ServiceIntelligence driven SOC as a Service
Intelligence driven SOC as a Service
 
LTS Secure intelligence driven security operation center
LTS Secure intelligence driven security operation centerLTS Secure intelligence driven security operation center
LTS Secure intelligence driven security operation center
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
 
Top Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemTop Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against Them
 
Security Information and Event Managemen
Security Information and Event ManagemenSecurity Information and Event Managemen
Security Information and Event Managemen
 
SIEM (Security Information and Event Management)
SIEM (Security Information and Event Management)SIEM (Security Information and Event Management)
SIEM (Security Information and Event Management)
 
Gartner_Critical Capabilities for SIEM 9.21.15
Gartner_Critical Capabilities for SIEM 9.21.15Gartner_Critical Capabilities for SIEM 9.21.15
Gartner_Critical Capabilities for SIEM 9.21.15
 
Force 3 Software Practice Overview
Force 3 Software Practice OverviewForce 3 Software Practice Overview
Force 3 Software Practice Overview
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the Curve
 
Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 

Andere mochten auch

CERTIFICADOS A GRADO 2013-I ESTUDIOS JURIDICOS
CERTIFICADOS A GRADO 2013-I ESTUDIOS JURIDICOSCERTIFICADOS A GRADO 2013-I ESTUDIOS JURIDICOS
CERTIFICADOS A GRADO 2013-I ESTUDIOS JURIDICOSDavid Leon Sicilia
 
Fixing Design-Time Validation Errors
Fixing Design-Time Validation ErrorsFixing Design-Time Validation Errors
Fixing Design-Time Validation ErrorsFlexera
 
Virtual Desktops for the Enterprise
Virtual Desktops for the EnterpriseVirtual Desktops for the Enterprise
Virtual Desktops for the EnterpriseFlexera
 
5gt 时间控制
5gt 时间控制5gt 时间控制
5gt 时间控制mickchen
 
Voz insesamista 4
Voz insesamista 4Voz insesamista 4
Voz insesamista 4mrmaldana
 
Invisible Exhibitor - MAYA Design
Invisible Exhibitor - MAYA DesignInvisible Exhibitor - MAYA Design
Invisible Exhibitor - MAYA DesignErik Dahl
 
2011 proposal-renovasi-2-okok
2011 proposal-renovasi-2-okok2011 proposal-renovasi-2-okok
2011 proposal-renovasi-2-okokzaenal mukodir
 
Audience Profile.
Audience Profile.Audience Profile.
Audience Profile.BecWalton1
 
Membership Site With Google Plus Community
Membership Site With Google Plus CommunityMembership Site With Google Plus Community
Membership Site With Google Plus CommunityLouisa Chan 陈毅信
 
Delivering Results to the Last Uncluttered Space
Delivering Results to the Last Uncluttered SpaceDelivering Results to the Last Uncluttered Space
Delivering Results to the Last Uncluttered SpacePower Direct
 
La Crosse Bike Summit March 2010
La Crosse Bike Summit March 2010La Crosse Bike Summit March 2010
La Crosse Bike Summit March 2010ckohner
 
Flexera Software App Portal - French
Flexera Software App Portal - FrenchFlexera Software App Portal - French
Flexera Software App Portal - FrenchFlexera
 
Portfolio For Beth Pikelny
Portfolio For Beth PikelnyPortfolio For Beth Pikelny
Portfolio For Beth Pikelnybethpikelny
 
Turning Customer Usage Data into Valuable Business Intelligence
Turning Customer Usage Data into Valuable Business IntelligenceTurning Customer Usage Data into Valuable Business Intelligence
Turning Customer Usage Data into Valuable Business IntelligenceFlexera
 
Ciencia y tecnologia en venezuela
Ciencia y tecnologia en venezuelaCiencia y tecnologia en venezuela
Ciencia y tecnologia en venezuelaDavid Leon Sicilia
 
エンタープライズアプリストアの構築
エンタープライズアプリストアの構築エンタープライズアプリストアの構築
エンタープライズアプリストアの構築Flexera
 

Andere mochten auch (20)

CERTIFICADOS A GRADO 2013-I ESTUDIOS JURIDICOS
CERTIFICADOS A GRADO 2013-I ESTUDIOS JURIDICOSCERTIFICADOS A GRADO 2013-I ESTUDIOS JURIDICOS
CERTIFICADOS A GRADO 2013-I ESTUDIOS JURIDICOS
 
Fixing Design-Time Validation Errors
Fixing Design-Time Validation ErrorsFixing Design-Time Validation Errors
Fixing Design-Time Validation Errors
 
Greek myths
Greek mythsGreek myths
Greek myths
 
Virtual Desktops for the Enterprise
Virtual Desktops for the EnterpriseVirtual Desktops for the Enterprise
Virtual Desktops for the Enterprise
 
5gt 时间控制
5gt 时间控制5gt 时间控制
5gt 时间控制
 
Voz insesamista 4
Voz insesamista 4Voz insesamista 4
Voz insesamista 4
 
Invisible Exhibitor - MAYA Design
Invisible Exhibitor - MAYA DesignInvisible Exhibitor - MAYA Design
Invisible Exhibitor - MAYA Design
 
2011 proposal-renovasi-2-okok
2011 proposal-renovasi-2-okok2011 proposal-renovasi-2-okok
2011 proposal-renovasi-2-okok
 
Audience Profile.
Audience Profile.Audience Profile.
Audience Profile.
 
Membership Site With Google Plus Community
Membership Site With Google Plus CommunityMembership Site With Google Plus Community
Membership Site With Google Plus Community
 
Delivering Results to the Last Uncluttered Space
Delivering Results to the Last Uncluttered SpaceDelivering Results to the Last Uncluttered Space
Delivering Results to the Last Uncluttered Space
 
La Crosse Bike Summit March 2010
La Crosse Bike Summit March 2010La Crosse Bike Summit March 2010
La Crosse Bike Summit March 2010
 
Metricas
MetricasMetricas
Metricas
 
Flexera Software App Portal - French
Flexera Software App Portal - FrenchFlexera Software App Portal - French
Flexera Software App Portal - French
 
Turkey report full
Turkey report fullTurkey report full
Turkey report full
 
Portfolio For Beth Pikelny
Portfolio For Beth PikelnyPortfolio For Beth Pikelny
Portfolio For Beth Pikelny
 
Turning Customer Usage Data into Valuable Business Intelligence
Turning Customer Usage Data into Valuable Business IntelligenceTurning Customer Usage Data into Valuable Business Intelligence
Turning Customer Usage Data into Valuable Business Intelligence
 
56
5656
56
 
Ciencia y tecnologia en venezuela
Ciencia y tecnologia en venezuelaCiencia y tecnologia en venezuela
Ciencia y tecnologia en venezuela
 
エンタープライズアプリストアの構築
エンタープライズアプリストアの構築エンタープライズアプリストアの構築
エンタープライズアプリストアの構築
 

Ähnlich wie SecureWorks

Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesMuhammad Mudassar
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabiltiesSneha .
 
Managed firewall service.
Managed firewall service.Managed firewall service.
Managed firewall service.Mindtree Ltd.
 
SKIRE HOSTING SERVICES
SKIRE HOSTING SERVICESSKIRE HOSTING SERVICES
SKIRE HOSTING SERVICESwebhostingguy
 
Securaa - November 2023.pptx
Securaa - November 2023.pptxSecuraa - November 2023.pptx
Securaa - November 2023.pptxseccurra123
 
On-Site Computer Solutions
On-Site Computer SolutionsOn-Site Computer Solutions
On-Site Computer Solutionsyourocs
 
Information technology and information security services
Information technology and information security servicesInformation technology and information security services
Information technology and information security servicesDejan Majkic
 
Nexum Federal Brochure
Nexum Federal BrochureNexum Federal Brochure
Nexum Federal BrochureMike Fatigati
 
Citadon Hosting Services
Citadon Hosting ServicesCitadon Hosting Services
Citadon Hosting Serviceswebhostingguy
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessInfopulse
 
CyberHive Offers CyberHive Connect, Built Using a Secure-by-Design Methodolog...
CyberHive Offers CyberHive Connect, Built Using a Secure-by-Design Methodolog...CyberHive Offers CyberHive Connect, Built Using a Secure-by-Design Methodolog...
CyberHive Offers CyberHive Connect, Built Using a Secure-by-Design Methodolog...online Marketing
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBMerlin Govender
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier AGC Networks Ltd
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfMdZabedHossain2
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Merlin Govender
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Emmerick Gortz
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdfMetaorange
 

Ähnlich wie SecureWorks (20)

Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 
___2360_SP_VMAN---Screen
___2360_SP_VMAN---Screen___2360_SP_VMAN---Screen
___2360_SP_VMAN---Screen
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
Managed firewall service.
Managed firewall service.Managed firewall service.
Managed firewall service.
 
SKIRE HOSTING SERVICES
SKIRE HOSTING SERVICESSKIRE HOSTING SERVICES
SKIRE HOSTING SERVICES
 
Securaa - November 2023.pptx
Securaa - November 2023.pptxSecuraa - November 2023.pptx
Securaa - November 2023.pptx
 
On-Site Computer Solutions
On-Site Computer SolutionsOn-Site Computer Solutions
On-Site Computer Solutions
 
Information technology and information security services
Information technology and information security servicesInformation technology and information security services
Information technology and information security services
 
Nexum Federal Brochure
Nexum Federal BrochureNexum Federal Brochure
Nexum Federal Brochure
 
Citadon Hosting Services
Citadon Hosting ServicesCitadon Hosting Services
Citadon Hosting Services
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
CyberHive Offers CyberHive Connect, Built Using a Secure-by-Design Methodolog...
CyberHive Offers CyberHive Connect, Built Using a Secure-by-Design Methodolog...CyberHive Offers CyberHive Connect, Built Using a Secure-by-Design Methodolog...
CyberHive Offers CyberHive Connect, Built Using a Secure-by-Design Methodolog...
 
Tesseract Service Portfolio
Tesseract Service PortfolioTesseract Service Portfolio
Tesseract Service Portfolio
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEB
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215
 
IntelAdapt
IntelAdaptIntelAdapt
IntelAdapt
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 

Kürzlich hochgeladen

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Kürzlich hochgeladen (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

SecureWorks

  • 1. 4162425-111760Capabilities Statement General Overview SecureWorks is an independent Information Security Services Provider, focused solely on the delivery of best-of-breed, FISMA compliant, vendor-neutral security services. Recognized as a leader in the IT security industry, SecureWorks provides security infrastructure monitoring, management and consulting offerings to help Federal Clients reduce risk to assets and defend against the ongoing threat to networks and systems present in today’s internetworked environment. SecureWorks is the leading “Security as a Service” provider safeguarding over 2,700 organizations. SecureWorks, focuses exclusively on security services, and is positioned in the Leader's Quadrant in Gartner's Magic Quadrant for Managed Security Services Providers (MSSPs). We protect SecureWorks clients through a combination of a purpose-built, on-demand Security Management platform, applied research from the SecureWorks Counter Threat Unit™ and 24x7 monitoring and management by an analysis team of SANS GIAC-certified experts. Why SecureWorks? Gain a Trusted Security Partner for FISMA Compliance SecureWorks is a vendor neutral provider focused solely on securing critical assets. SecureWorks data collection and unparalleled reporting capability provide assistance with compliance to NIST 800-53. SecureWorks’ certified, experienced Security Operations Center staff serves as an extension of agency security teams, providing objective security advice and unlimited consultation. And, in addition to supporting the FISMA compliance process, Information Security Services from SecureWorks will provide “Best In Class Protection” as it relates to Cyber-Security while lowering your costs. Established Federal Government Service Provider SecureWorks provides Information Security Services to a variety of federal agency clients through relationships with IT management and IT security focused prime contractors. As a validated federal supplier and subcontractor, SecureWorks can fully deploy services in a matter of days from contract award. Unparalleled Internal and External Threat Visibility SecureWorks leverages the visibility gained from monitoring billions of security events everyday across more than 2,000 clients located throughout the world to deliver proactive protection. SecureWorks global visibility enables its CTU (Counter Threat Unit) research team to identify emerging threats as they arise and establish countermeasures to keep critical agency information assets secured. Industry-Leading Client Portal With robust security and compliance reporting capabilities, the SecureWorks Portal is recognized by industry analysts and clients alike as the premier client portal in the marketplace. The Portal provides comprehensive enterprise security vision and service transparency, facilitating the partnership required for effective threat and vulnerability management. The Portal is a powerful yet easy-to-use feature of SecureWorks’ services that delivers tremendous value to agency security teams by providing comprehensive reporting and compliance data and visibility to security events and incidents. Integrated and Advanced Technology Platform SecureWorks proprietary, purpose-built Sherlock Security Management Platform enables services to be tailored to specific agency requirements. Sherlock has tremendous scalability, processing billions of security events every day across the SecureWorks client base. Capable of monitoring virtually any security technology or critical information asset, the Platform provides SecureWorks’ Security Analysts with maximum security context for full, in-depth analysis while virtually eliminating false positives. Services Overview Professional Services SecureWorks' Professional Services provide expertise and analysis to help IT security managers to improve the agency’s security posture, facilitate compliance, and improve operational efficiency. With deep experience in industry regulations and standards, SecureWorks’ security professionals identify risk to prepare for a favorable audit of agency IT security controls. SecureWorks’ Professional Services include: Compliance: FISMA, SOX, NERC CIP, NISPOM Risk Assessment Penetration Testing Incident Handling and Forensics Web Application Testing Business Impact Analysis Policy Development SIM On-Demand SecureWorks’ SIM On-Demand Service allows organizations to attain all the benefits of traditional SIM software, without experiencing any of the drawbacks. SecureWorks’ SIM On-Demand Service delivers event aggregation, correlation and reporting “in-the-cloud,” requiring no lengthy software implementations. The SIM On-Demand service can be up and running in a matter of days, immediately presenting your agency’s IT security team with actionable information, a consolidated view of the security status of critical assets and on-demand compliance reports via the secure web-based SecureWorks Portal. Service features include: Rapid implementation and no management overhead Vendor neutral, infrastructure-wide event aggregation and advanced correlation Asset classification, remediation workflow and 24x7 access to SecureWorks’ security experts On-demand security and compliance reports through the SecureWorks real-time client Portal Security Monitoring SecureWorks’ Security Monitoring Service provides 24x7x365 vigilance over your agency’s critical information assets. SecureWorks’ Security Analysts will monitor, analyze and respond to security events from security devices, network infrastructure, servers, databases, applications or any other critical information asset in real-time. Service features: Expert analysis by SecureWorks’ 100% GIAC certified team of Security Analysts Vendor neutral, infrastructure-wide coverage Real-time, 24x7 monitoring, correlation and incident response On-demand security and compliance reports through the SecureWorks real-time client Portal SecureWorks recommends the Security Monitoring service for all critical security or information assets that require 24x7x365 monitoring by experienced security professionals. This may include firewalls, IDS/IPS, VPNs, routers, web servers, databases, applications and any other high-value asset. SecureWorks can monitor virtually any security device or critical information asset and perform full correlation and analysis across the agency’s enterprise systems to detect threats to assets. Managed Network Intrusion Detection/Prevention SecureWorks provides 24x7x365 monitoring and full lifecycle management of your agency’s IDS/IPS infrastructure. SecureWorks provides proactive management and real-time security event monitoring and analysis across the Network Intrusion Prevention and Detection infrastructure. SecureWorks’ award-winning Managed Network Intrusion Prevention and Detection Service can support the agency’s current and future best-of-breed environment, as well as provide superior protection in a cost-effective technology and service bundle. This service is delivered in a co-managed fashion, where the agency’s IT security management team retains ownership and administrative access to the devices while SecureWorks performs all management and monitoring activities. Features of this service include: 24x7x365 real-time monitoring by 100% GIAC certified security experts Real-time blocking of malicious Internet activity before compromise Proactive administration, signature tuning and maintenance Countermeasure deployment based on SecureWorks’ industry-leading threat visibility On-demand security, board-level and compliance reports Managed Firewall SecureWorks provides 24x7x365 management and monitoring of your agency’s firewall and gateway appliance infrastructure. SecureWorks’ experts provide scoping, deployment, policy configuration and ongoing management of supported firewall devices. SecureWorks’ managed firewall and VPN services provide the 24x7 expertise needed to enhance the agency’s security posture, improve operational efficiency and reduce the costs associated with implementing and maintaining firewall and VPN devices. Managed Firewall service is delivered in a co-managed fashion where the agency’s IT security management team retains ownership and administrative rights to the devices. This service includes: Site assessment and firewall policy design Firewall installation, configuration and maintenance Total lifecycle management including performance and troubleshooting 24x7 firewall monitoring to detect known and unknown threats Concise easy to understand reporting Managed Host Intrusion Prevention SecureWorks’ Managed Host Intrusion Prevention Service protects your agency’s network from attacks that can damage applications, data, or the underlying operating system. This service delivers protection at the host level by blocking behavior that signals malicious activity. This service includes: Real-time behavior-based attack blocking Protection against attacks that bypass perimeter security Policy set management, automatic updates and all other maintenance 24x7x365 real-time monitoring and response Comprehensive reporting Vulnerability Scanning SecureWorks' Vulnerability Scanning Service identifies exposures and weak spots within your agency’s network through powerful internal and external scanning. As a client-driven service, IT security managers have full control of scanning parameters and scheduling through the SecureWorks Portal. Service features include: Internal and external scanning Scanning of all 65,000 ports (not just the first 16,000) Prioritized remediation and trending information On-demand security and compliance reports Threat Intelligence SecureWorks' Threat Intelligence delivers early warnings about emerging threats and actionable security intelligence tailored to your agency’s environment, providing more time to protect critical assets. The industry-leading SecureWorks CTU aggregates threats and vulnerabilities, accurately assesses severity levels and provides IT security managers with the steps needed to remediate these issues before they impact the agency’s IT environment. The threat intelligence service streamlines the vulnerability research and security intelligence process in order to provide clients with more time to protect their critical information assets. Service features include: Actionable information tailored to the agency’s environment Early warnings to emerging threats Clear, concise threat and vulnerability analyses Remediation information Unlimited consultation with SecureWorks’ industry recognized security researchers Purchasing Information Contact for all Federal agency and Contractor inquiries: Justin DuHaime Director, Business Development, Federal Government (202) 903-0088 jduhaime@secureworks.com