SlideShare a Scribd company logo
1 of 12
CLOUD
SECURITYFROM WINDSTREAM
Comprehensive confidentiality, integrity,
and availability for networks of all sizes
CLOUD SECURITY IS DIFFERENT
Copyright 2015. All Rights Reserved.2
Decisions concerning the security of data
in the cloud has shifted from the IT room
to the boardroom, with 61% of companies
indicating that executives are now
involved in such decisions.
Cloud Security Alliance, Cloud Security Alliance New Survey Finds Companies
are in the Dark on Shadow IT Usage, January 9, 2015
Copyright 2015. All Rights Reserved.3
“While security of data remains a top barrier to
cloud adoption, organizations are still moving
forward in adopting cloud services, with 74% of
respondents indicating they are either moving full
steam ahead, or with caution…”
Cloud Security Alliance, Cloud Security Alliance New Survey Finds
Companies are in the Dark on Shadow IT Usage, January 9, 2015
SEEKING OUT THE CLOUD, BUT STILL WARY OF IT
WHEN YOU ENTRUST YOUR APPLICATIONS AND YOUR DATA
TO A THIRD PARTY, YOU NEED TO KNOW THEY’RE SECURE—
FROM IT TO THE BOARDROOM.
WINDSTREAM CLOUD SECURITY –
ENTERPRISE-READY
Copyright 2015. All Rights Reserved.4
SMART
Windstream is not just a Fortune
500 company. Windstream is the
provider of choice for four out
of five Fortune 500 companies
for data, voice, network and cloud
solutions.
COMPLIANT
Windstream knows, and
regularly meets, the evolving
security needs of the
enterprise—from retail to
healthcare, to finance, and
everything in between.
PERSONAL
Whether on your premise, or in
our enterprise-class data centers,
Windstream engineers work
with you to provide solutions
that are personalized to your
individual security needs.
SUPPORTING AND PROTECTING AT EVERY POINT
Copyright 2015. All Rights Reserved.5
Preventing unauthorized
access to your resources.
DATA
PRIVACY
Protecting the data center with checkpoints, access
mechanisms, and robust emergency procedures.
PHYSICAL
SECURITY
Maintaining a secure network environment
for data and other traffic.
NETWORK
SECURITY
SECURITY SUPREME AT THE DATA CENTER
Copyright 2015. All Rights Reserved.6
Data resides in a
secure WIN facility
on secure servers
with 24x7
monitoring by NOC
24x7 staffed
physical security
Biometric access
control
Access to cages
and cabinets
require an escort
from security
personnel
Cameras digitally
record and retain all
movement in and
around the data
center
Fully compliant with
SSAE-16, SOC 1
Type II, SOC 2
Type II, SOC 3,
PCI-DSS, HIPAA,
HITECH AT101,
NIST 800-53 and
SAFE HARBOR
Proximity plus
security code
readers on all main
entrance doors to
the general facility
AND AT EVERY OTHER JUNCTURE:
THE CIA TRIAD
Copyright 2015. All Rights Reserved.7
The CIA Triad is a venerable,
well-known model for security
policy development, used
to identify problem areas and
necessary solutions for
information security.
IT IS WINDSTREAM’S
SECURITY FOUNDATION.
Techrepublic, “The CIA Triad” http://www.techrepublic.com/blog/it-security/the-cia-triad/
AVAILABILITY
CONFIDENTIALITY
INTEGRITY
The availability of information resources—that
they’re there when you need them—from
pieces of data to the communications
infrastructure.
The trustworthiness of information sources—that data have not been changed
inappropriately, whether deliberately or by accident. The concept also includes
assurance that the data came from the source you think it came from—the source
on which you’re relying.
Limiting information access and disclosure only to authorized
users, and preventing access to unauthorized ones.
Multi-Factor Authentication
Anti-Virus / Anti-Malware Service
Access Control Lists
CONFIDENTIALITY
Copyright 2015. All Rights Reserved.8
Authentication to identify and limit users,
including user IDs and passwords
Protections against malware, spyware,
spam and phishing attacks
Limiting access to individuals’ personal information,
including policies mapped to help you meet
and exceed regulatory requirements
Windstream security tools
to meet confidentiality
requirements include:
Methods of assuring
confidentiality include:
INTEGRITY
Copyright 2015. All Rights Reserved.9
To help maintain the integrity
of your data—to preserve
without corruption whatever
was transmitted or entered
into the system, right or
wrong, Windstream employs:
• Intrusion Detection Systems (IDS)
• Log Monitoring
• Vulnerability Scanning
• DDoS Protection
• Web Application Firewall
• Managed Firewall
• Data Encryption
AVAILABILITY
Copyright 2015. All Rights Reserved.10
Data availability can be
affected by a
malfunctioning computer
or device, malicious
intrusion, natural
phenomena like wind
or water, or human
causes, accidental or
deliberate.
All Windstream security policies and procedures,
from the network to the managed service
contribute to data availability, protecting you
to the level you require from:
• Physical or virtual server failure
• Physical harm to, or natural disaster
impacting the data center
• Malware, DDoS, or other malicious attack
• Unauthorized access to data
Additional tools enabling data availability include:
• Managed Firewall
• Managed Anti-Virus / Anti-Malware
• Global Load Balancing
A COMPLETE
SECURITY PORTFOLIO
Copyright 2015. All Rights Reserved.11
Backed by policies and
procedures that adhere to the
CIA security policies model,
Windstream custom delivers
security solutions designed to
meet your individual business
needs, including:
Business
Continuity
Managed
Remote Backup
DRaaS
Wireless
3G/4G Backup
IaaS
Redundant
Circuitry
Managed
Storage/Security
 Managed Firewall  Operating System Hardening
 Intrusion Detection  DDoS Mitigation
 Log Management  Web Application Firewall
 Threat Management  Vulnerability Scanning
 Monitoring  VPN Services
 Multi-factor Authentication  Physical Data Center Security
 Anti-virus / Anti-Malware
Services
 Email Security
 Global Load Balancing
Copyright 2015. All Rights Reserved.12
The highest security, customized for your
network, your data, and your business
WINDSTREAM CLOUD SECURITY

More Related Content

What's hot

Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016
patmisasi
 
Worry free security breach - Gemalto
Worry free security breach - GemaltoWorry free security breach - Gemalto
Worry free security breach - Gemalto
Harry Gunns
 
How to protect business from malware
How to protect business from malware How to protect business from malware
How to protect business from malware
Sanyog Chandra
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
Sam Norallah
 

What's hot (20)

Gov & Education Day 2015 - Tim Lee, City of Los Angeles
Gov & Education Day 2015 - Tim Lee, City of Los AngelesGov & Education Day 2015 - Tim Lee, City of Los Angeles
Gov & Education Day 2015 - Tim Lee, City of Los Angeles
 
Gartner presentation risq dec 2016 jie zhang
Gartner presentation risq dec 2016 jie zhangGartner presentation risq dec 2016 jie zhang
Gartner presentation risq dec 2016 jie zhang
 
Data Security: Are you Protected?
Data Security: Are you Protected?Data Security: Are you Protected?
Data Security: Are you Protected?
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016
 
Aujas Cyber Security
Aujas Cyber SecurityAujas Cyber Security
Aujas Cyber Security
 
Cloud & Sécurité
Cloud & SécuritéCloud & Sécurité
Cloud & Sécurité
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
 
Google peter logli & jake shea
Google   peter logli & jake sheaGoogle   peter logli & jake shea
Google peter logli & jake shea
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
 
Worry free security breach - Gemalto
Worry free security breach - GemaltoWorry free security breach - Gemalto
Worry free security breach - Gemalto
 
BITGLASS - DATA BREACH DISCOVERY DATASHEET
BITGLASS - DATA BREACH DISCOVERY DATASHEETBITGLASS - DATA BREACH DISCOVERY DATASHEET
BITGLASS - DATA BREACH DISCOVERY DATASHEET
 
Infographic: 5 Tips for Approaching Customers About Cloud Security
Infographic: 5 Tips for Approaching Customers About Cloud SecurityInfographic: 5 Tips for Approaching Customers About Cloud Security
Infographic: 5 Tips for Approaching Customers About Cloud Security
 
How to protect business from malware
How to protect business from malware How to protect business from malware
How to protect business from malware
 
Insider Threat Protection | Seclore
Insider Threat Protection | SecloreInsider Threat Protection | Seclore
Insider Threat Protection | Seclore
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
 
Global Cybersecurity Consulting Firm
Global Cybersecurity Consulting FirmGlobal Cybersecurity Consulting Firm
Global Cybersecurity Consulting Firm
 
Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity
 
Cyber Security Services
Cyber Security ServicesCyber Security Services
Cyber Security Services
 
Active Directory: Modern Threats, Medieval Protection
Active Directory: Modern Threats, Medieval ProtectionActive Directory: Modern Threats, Medieval Protection
Active Directory: Modern Threats, Medieval Protection
 

Viewers also liked

Thu-310pm-Impetus-SachinAndAjay
Thu-310pm-Impetus-SachinAndAjayThu-310pm-Impetus-SachinAndAjay
Thu-310pm-Impetus-SachinAndAjay
Ajay Shriwastava
 
2011 Windstream Overview
2011 Windstream Overview2011 Windstream Overview
2011 Windstream Overview
Mark Sinofsky
 

Viewers also liked (12)

Windstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security Myths
 
Maximizing it budget
Maximizing it budgetMaximizing it budget
Maximizing it budget
 
Windstream Webinar: Maximizing Your IT Budget
Windstream Webinar: Maximizing Your IT BudgetWindstream Webinar: Maximizing Your IT Budget
Windstream Webinar: Maximizing Your IT Budget
 
Web security
Web securityWeb security
Web security
 
Thu-310pm-Impetus-SachinAndAjay
Thu-310pm-Impetus-SachinAndAjayThu-310pm-Impetus-SachinAndAjay
Thu-310pm-Impetus-SachinAndAjay
 
Building the future of Digital Television and Enterprise Database Management ...
Building the future of Digital Television and Enterprise Database Management ...Building the future of Digital Television and Enterprise Database Management ...
Building the future of Digital Television and Enterprise Database Management ...
 
Windstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data Center
 
2011 Windstream Overview
2011 Windstream Overview2011 Windstream Overview
2011 Windstream Overview
 
The Telecommunications Business in Switzerland - Liberalization and Regulation
The Telecommunications Business in Switzerland - Liberalization and RegulationThe Telecommunications Business in Switzerland - Liberalization and Regulation
The Telecommunications Business in Switzerland - Liberalization and Regulation
 
Hadoop data access layer v4.0
Hadoop data access layer v4.0Hadoop data access layer v4.0
Hadoop data access layer v4.0
 
Swisscom Intranet Transformation Journey - Digital Workplace Group live
Swisscom Intranet Transformation Journey - Digital Workplace Group liveSwisscom Intranet Transformation Journey - Digital Workplace Group live
Swisscom Intranet Transformation Journey - Digital Workplace Group live
 
Webnesday - Introduction to LoRaWAN
Webnesday - Introduction to LoRaWANWebnesday - Introduction to LoRaWAN
Webnesday - Introduction to LoRaWAN
 

Similar to Windstream Cloud Security Presentation

Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
EY
 

Similar to Windstream Cloud Security Presentation (20)

CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution Overview
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfTop Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of things
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Zero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeZero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital Age
 
Data security
Data securityData security
Data security
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Seven steps for improving cloud security with business integration
Seven steps for improving cloud security with business integrationSeven steps for improving cloud security with business integration
Seven steps for improving cloud security with business integration
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattsson
 
Security and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxSecurity and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptx
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 

More from Ideba

More from Ideba (20)

Kaufman Hall Healthcare Infographic
Kaufman Hall Healthcare InfographicKaufman Hall Healthcare Infographic
Kaufman Hall Healthcare Infographic
 
Kaufman Hall Finance Infographic
Kaufman Hall Finance InfographicKaufman Hall Finance Infographic
Kaufman Hall Finance Infographic
 
Kaufman Hall Education Infographic
Kaufman Hall Education InfographicKaufman Hall Education Infographic
Kaufman Hall Education Infographic
 
Kaufman Hall Axiom Software - Emory Case Study
Kaufman Hall Axiom Software - Emory Case StudyKaufman Hall Axiom Software - Emory Case Study
Kaufman Hall Axiom Software - Emory Case Study
 
Microsoft Teams Infographic
Microsoft Teams Infographic Microsoft Teams Infographic
Microsoft Teams Infographic
 
C4 Database Management Onboarding
C4 Database Management OnboardingC4 Database Management Onboarding
C4 Database Management Onboarding
 
C4 Database Management Website
C4 Database Management WebsiteC4 Database Management Website
C4 Database Management Website
 
FINEOS Booth
FINEOS BoothFINEOS Booth
FINEOS Booth
 
FINEOS Website
FINEOS WebsiteFINEOS Website
FINEOS Website
 
Kaufman Hall Axiom Booth (2/2)
Kaufman Hall Axiom Booth (2/2)Kaufman Hall Axiom Booth (2/2)
Kaufman Hall Axiom Booth (2/2)
 
Kaufman Hall Axiom Booth (1/2)
Kaufman Hall Axiom Booth (1/2)Kaufman Hall Axiom Booth (1/2)
Kaufman Hall Axiom Booth (1/2)
 
Greenway Health Amicus Case Study
Greenway Health Amicus Case StudyGreenway Health Amicus Case Study
Greenway Health Amicus Case Study
 
Greenway Health Dr. Randolph Lamberson Case Study
Greenway Health Dr. Randolph Lamberson Case StudyGreenway Health Dr. Randolph Lamberson Case Study
Greenway Health Dr. Randolph Lamberson Case Study
 
Cortez Health Case Study
Cortez Health Case StudyCortez Health Case Study
Cortez Health Case Study
 
Greenway Health Primary Care Internists Case Study
Greenway Health Primary Care Internists Case StudyGreenway Health Primary Care Internists Case Study
Greenway Health Primary Care Internists Case Study
 
Greenway Health EHR Satisfaction Infographic
Greenway Health EHR Satisfaction InfographicGreenway Health EHR Satisfaction Infographic
Greenway Health EHR Satisfaction Infographic
 
Greenway Health Cow Creek Case Study
Greenway Health Cow Creek Case StudyGreenway Health Cow Creek Case Study
Greenway Health Cow Creek Case Study
 
Greenway Health Case Study Infographic
Greenway Health Case Study InfographicGreenway Health Case Study Infographic
Greenway Health Case Study Infographic
 
Ideba Uganda 2020 Logo Options
Ideba Uganda 2020 Logo OptionsIdeba Uganda 2020 Logo Options
Ideba Uganda 2020 Logo Options
 
Ideba Creative Portfolio
Ideba Creative PortfolioIdeba Creative Portfolio
Ideba Creative Portfolio
 

Recently uploaded

Mastering Affiliate Marketing: A Comprehensive Guide to Success
Mastering Affiliate Marketing: A Comprehensive Guide to SuccessMastering Affiliate Marketing: A Comprehensive Guide to Success
Mastering Affiliate Marketing: A Comprehensive Guide to Success
Abdulsamad Lukman
 

Recently uploaded (20)

Distribution Ad Platform_ The Role of Distribution Ad Network.pdf
Distribution Ad Platform_ The Role of  Distribution Ad Network.pdfDistribution Ad Platform_ The Role of  Distribution Ad Network.pdf
Distribution Ad Platform_ The Role of Distribution Ad Network.pdf
 
The 9th May Incident in Pakistan A Turning Point in History.pptx
The 9th May Incident in Pakistan A Turning Point in History.pptxThe 9th May Incident in Pakistan A Turning Point in History.pptx
The 9th May Incident in Pakistan A Turning Point in History.pptx
 
Enhancing Business Visibility PR Firms in San Francisco
Enhancing Business Visibility PR Firms in San FranciscoEnhancing Business Visibility PR Firms in San Francisco
Enhancing Business Visibility PR Firms in San Francisco
 
Elevating Your Digital Presence by Evitha.pdf
Elevating Your Digital Presence by Evitha.pdfElevating Your Digital Presence by Evitha.pdf
Elevating Your Digital Presence by Evitha.pdf
 
Press Release Distribution Evolving with Digital Trends.pdf
Press Release Distribution Evolving with Digital Trends.pdfPress Release Distribution Evolving with Digital Trends.pdf
Press Release Distribution Evolving with Digital Trends.pdf
 
Social Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh BendaySocial Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh Benday
 
SALES-PITCH-an-introduction-to-sales.pptx
SALES-PITCH-an-introduction-to-sales.pptxSALES-PITCH-an-introduction-to-sales.pptx
SALES-PITCH-an-introduction-to-sales.pptx
 
Elevate Your Advertising Game: Introducing Billion Broadcaster Lift Advertising
Elevate Your Advertising Game: Introducing Billion Broadcaster Lift AdvertisingElevate Your Advertising Game: Introducing Billion Broadcaster Lift Advertising
Elevate Your Advertising Game: Introducing Billion Broadcaster Lift Advertising
 
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night ServiceVIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
 
Optimizing Your Marketing with AI-Powered Prompts
Optimizing Your Marketing with AI-Powered PromptsOptimizing Your Marketing with AI-Powered Prompts
Optimizing Your Marketing with AI-Powered Prompts
 
Choosing the Right White Label SEO Services to Boost Your Agency's Growth.pdf
Choosing the Right White Label SEO Services to Boost Your Agency's Growth.pdfChoosing the Right White Label SEO Services to Boost Your Agency's Growth.pdf
Choosing the Right White Label SEO Services to Boost Your Agency's Growth.pdf
 
Mastering Affiliate Marketing: A Comprehensive Guide to Success
Mastering Affiliate Marketing: A Comprehensive Guide to SuccessMastering Affiliate Marketing: A Comprehensive Guide to Success
Mastering Affiliate Marketing: A Comprehensive Guide to Success
 
Aiizennxqc Digital Marketing | SEO & SMM
Aiizennxqc Digital Marketing | SEO & SMMAiizennxqc Digital Marketing | SEO & SMM
Aiizennxqc Digital Marketing | SEO & SMM
 
Digital-Marketing-Into-by-Zoraiz-Ahmad.pptx
Digital-Marketing-Into-by-Zoraiz-Ahmad.pptxDigital-Marketing-Into-by-Zoraiz-Ahmad.pptx
Digital-Marketing-Into-by-Zoraiz-Ahmad.pptx
 
Tata Punch brochure with complete detail of all the variants
Tata Punch brochure with complete detail of all the variantsTata Punch brochure with complete detail of all the variants
Tata Punch brochure with complete detail of all the variants
 
Unlocking the Mystery of the Voynich Manuscript
Unlocking the Mystery of the Voynich ManuscriptUnlocking the Mystery of the Voynich Manuscript
Unlocking the Mystery of the Voynich Manuscript
 
Aligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency Escorts
Aligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency EscortsAligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency Escorts
Aligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency Escorts
 
How consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their livesHow consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their lives
 
SP Search Term Data Optimization Template.pdf
SP Search Term Data Optimization Template.pdfSP Search Term Data Optimization Template.pdf
SP Search Term Data Optimization Template.pdf
 
Social Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh BendaySocial Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh Benday
 

Windstream Cloud Security Presentation

  • 1. CLOUD SECURITYFROM WINDSTREAM Comprehensive confidentiality, integrity, and availability for networks of all sizes
  • 2. CLOUD SECURITY IS DIFFERENT Copyright 2015. All Rights Reserved.2 Decisions concerning the security of data in the cloud has shifted from the IT room to the boardroom, with 61% of companies indicating that executives are now involved in such decisions. Cloud Security Alliance, Cloud Security Alliance New Survey Finds Companies are in the Dark on Shadow IT Usage, January 9, 2015
  • 3. Copyright 2015. All Rights Reserved.3 “While security of data remains a top barrier to cloud adoption, organizations are still moving forward in adopting cloud services, with 74% of respondents indicating they are either moving full steam ahead, or with caution…” Cloud Security Alliance, Cloud Security Alliance New Survey Finds Companies are in the Dark on Shadow IT Usage, January 9, 2015 SEEKING OUT THE CLOUD, BUT STILL WARY OF IT WHEN YOU ENTRUST YOUR APPLICATIONS AND YOUR DATA TO A THIRD PARTY, YOU NEED TO KNOW THEY’RE SECURE— FROM IT TO THE BOARDROOM.
  • 4. WINDSTREAM CLOUD SECURITY – ENTERPRISE-READY Copyright 2015. All Rights Reserved.4 SMART Windstream is not just a Fortune 500 company. Windstream is the provider of choice for four out of five Fortune 500 companies for data, voice, network and cloud solutions. COMPLIANT Windstream knows, and regularly meets, the evolving security needs of the enterprise—from retail to healthcare, to finance, and everything in between. PERSONAL Whether on your premise, or in our enterprise-class data centers, Windstream engineers work with you to provide solutions that are personalized to your individual security needs.
  • 5. SUPPORTING AND PROTECTING AT EVERY POINT Copyright 2015. All Rights Reserved.5 Preventing unauthorized access to your resources. DATA PRIVACY Protecting the data center with checkpoints, access mechanisms, and robust emergency procedures. PHYSICAL SECURITY Maintaining a secure network environment for data and other traffic. NETWORK SECURITY
  • 6. SECURITY SUPREME AT THE DATA CENTER Copyright 2015. All Rights Reserved.6 Data resides in a secure WIN facility on secure servers with 24x7 monitoring by NOC 24x7 staffed physical security Biometric access control Access to cages and cabinets require an escort from security personnel Cameras digitally record and retain all movement in and around the data center Fully compliant with SSAE-16, SOC 1 Type II, SOC 2 Type II, SOC 3, PCI-DSS, HIPAA, HITECH AT101, NIST 800-53 and SAFE HARBOR Proximity plus security code readers on all main entrance doors to the general facility
  • 7. AND AT EVERY OTHER JUNCTURE: THE CIA TRIAD Copyright 2015. All Rights Reserved.7 The CIA Triad is a venerable, well-known model for security policy development, used to identify problem areas and necessary solutions for information security. IT IS WINDSTREAM’S SECURITY FOUNDATION. Techrepublic, “The CIA Triad” http://www.techrepublic.com/blog/it-security/the-cia-triad/ AVAILABILITY CONFIDENTIALITY INTEGRITY The availability of information resources—that they’re there when you need them—from pieces of data to the communications infrastructure. The trustworthiness of information sources—that data have not been changed inappropriately, whether deliberately or by accident. The concept also includes assurance that the data came from the source you think it came from—the source on which you’re relying. Limiting information access and disclosure only to authorized users, and preventing access to unauthorized ones.
  • 8. Multi-Factor Authentication Anti-Virus / Anti-Malware Service Access Control Lists CONFIDENTIALITY Copyright 2015. All Rights Reserved.8 Authentication to identify and limit users, including user IDs and passwords Protections against malware, spyware, spam and phishing attacks Limiting access to individuals’ personal information, including policies mapped to help you meet and exceed regulatory requirements Windstream security tools to meet confidentiality requirements include: Methods of assuring confidentiality include:
  • 9. INTEGRITY Copyright 2015. All Rights Reserved.9 To help maintain the integrity of your data—to preserve without corruption whatever was transmitted or entered into the system, right or wrong, Windstream employs: • Intrusion Detection Systems (IDS) • Log Monitoring • Vulnerability Scanning • DDoS Protection • Web Application Firewall • Managed Firewall • Data Encryption
  • 10. AVAILABILITY Copyright 2015. All Rights Reserved.10 Data availability can be affected by a malfunctioning computer or device, malicious intrusion, natural phenomena like wind or water, or human causes, accidental or deliberate. All Windstream security policies and procedures, from the network to the managed service contribute to data availability, protecting you to the level you require from: • Physical or virtual server failure • Physical harm to, or natural disaster impacting the data center • Malware, DDoS, or other malicious attack • Unauthorized access to data Additional tools enabling data availability include: • Managed Firewall • Managed Anti-Virus / Anti-Malware • Global Load Balancing
  • 11. A COMPLETE SECURITY PORTFOLIO Copyright 2015. All Rights Reserved.11 Backed by policies and procedures that adhere to the CIA security policies model, Windstream custom delivers security solutions designed to meet your individual business needs, including: Business Continuity Managed Remote Backup DRaaS Wireless 3G/4G Backup IaaS Redundant Circuitry Managed Storage/Security  Managed Firewall  Operating System Hardening  Intrusion Detection  DDoS Mitigation  Log Management  Web Application Firewall  Threat Management  Vulnerability Scanning  Monitoring  VPN Services  Multi-factor Authentication  Physical Data Center Security  Anti-virus / Anti-Malware Services  Email Security  Global Load Balancing
  • 12. Copyright 2015. All Rights Reserved.12 The highest security, customized for your network, your data, and your business WINDSTREAM CLOUD SECURITY