SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Security and Compliance Powered by the Cloud
Corporate Fact Sheet
Select Alert Logic Customers
Security and Compliance Challenge IT organizations are faced with mounting pressure Compliance regulations PCI DSS, SOX, HIPAA, GLBA, NCUA, FFIEC, NIST, FISMA Continued evolution of network threats Alert Logic delivers cloud-based security and compliance solutions: Vulnerability Assessment Intrusion Protection Log Management Threat monitoring & incident response services
Solving Key Problems SECURITY Vulnerability  Management Identifying Weaknesses BEFORE Intrusion Protection IsolatingAttacks DURING Log Management InvestigatingIncidents AFTER DELIVERED IN-CLOUD ,[object Object]
 no capital expense
 no maintenance
 easy & affordable,[object Object]
Vulnerability Assessment Schedule ongoing internal and external vulnerability scans Alert Logic is an Approved Scanning Vendor (ASV) for quarterly PCI scans Results integrate with intrusion protection for optimum accuracy Why Cloud?Centralized view of internal & external scan results for your entire network
Intrusion Protection Automatically detect thousands of incidents with built-in correlation Protect your network with firewall and ACL based defensive actions Continuously updated to identify latest threats Why Cloud?Hosted expert system provides level of accuracy unmatched by hardware and software solutions
Optional Monitoring Services 24/7 threat monitoring for rapid incident response Integrated incident and case management
Log Management Collect logs from any syslog or windows source without agents Always-on, on-demand log storage Configure custom correlation rules and log alerts Why Cloud?Non-DBMS grid computing provides 10X+ faster search and reporting performance unmatched by appliance solutions
Cloud-based Solution Instead of Deploying This: Deploy This:
Cloud-based management redundant data centers, event processing and archival, analysis, reporting, compliance review and monitoring On-premise collection appliance based threat and vulnerability detection, log collection, compression, encryption and secure transport Cloud Architecture
Alert Logic Case Studies “I’m very impressed with Alert Logic”… “By utilizing their solutions, we are able to improve our security and compliance posture and at the same time reduce the resources that we have to dedicate to fulfill those needs.” 				- Mark Moseley, Rosetta Stone Problem ,[object Object],Results ,[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir JirasekISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir JirasekVladimir Jirasek
 
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...Qualys
 
Community IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security PolicyCommunity IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security PolicyCommunity IT Innovators
 
Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018Outpost24
 
Securing Your Network
Securing Your NetworkSecuring Your Network
Securing Your NetworkePlus
 
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24
 
NetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
NetScaler: One Device, Every Need Guiding Enterprise IT to New HeightsNetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
NetScaler: One Device, Every Need Guiding Enterprise IT to New HeightsePlus
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Oddscentralohioissa
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveyQualys
 
BSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software SecurityBSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software SecurityCigital
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Securitycentralohioissa
 
End Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoEnd Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoePlus
 
How to Secure Your IaaS and PaaS Environments
How to Secure Your IaaS and PaaS EnvironmentsHow to Secure Your IaaS and PaaS Environments
How to Secure Your IaaS and PaaS EnvironmentsInfo-Tech Research Group
 
ePlus Managed Security Services
ePlus Managed Security ServicesePlus Managed Security Services
ePlus Managed Security ServicesePlus
 
Seekintoo-Security Assessment & IR
Seekintoo-Security Assessment & IRSeekintoo-Security Assessment & IR
Seekintoo-Security Assessment & IRPaul Enright
 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examInfosec
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass
 

Was ist angesagt? (20)

ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir JirasekISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
 
Qualys Webex 24 June 2008
Qualys Webex 24 June 2008Qualys Webex 24 June 2008
Qualys Webex 24 June 2008
 
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
 
Community IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security PolicyCommunity IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security Policy
 
Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018
 
Securing Your Network
Securing Your NetworkSecuring Your Network
Securing Your Network
 
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
 
NetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
NetScaler: One Device, Every Need Guiding Enterprise IT to New HeightsNetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
NetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
 
BSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software SecurityBSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software Security
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Security
 
End Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoEnd Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and Cisco
 
Stu r36 b
Stu r36 bStu r36 b
Stu r36 b
 
Discover an IT Infrastructure Services & Management
Discover an IT Infrastructure Services & ManagementDiscover an IT Infrastructure Services & Management
Discover an IT Infrastructure Services & Management
 
How to Secure Your IaaS and PaaS Environments
How to Secure Your IaaS and PaaS EnvironmentsHow to Secure Your IaaS and PaaS Environments
How to Secure Your IaaS and PaaS Environments
 
ePlus Managed Security Services
ePlus Managed Security ServicesePlus Managed Security Services
ePlus Managed Security Services
 
Seekintoo-Security Assessment & IR
Seekintoo-Security Assessment & IRSeekintoo-Security Assessment & IR
Seekintoo-Security Assessment & IR
 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new exam
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use Cases
 

Andere mochten auch

Menarcheal age, length dimensions and body composition in a sample of schoolg...
Menarcheal age, length dimensions and body composition in a sample of schoolg...Menarcheal age, length dimensions and body composition in a sample of schoolg...
Menarcheal age, length dimensions and body composition in a sample of schoolg...Gustavo Casimiro
 
Nimbo/Alert Logic - Azure in the Cloud
Nimbo/Alert Logic - Azure in the CloudNimbo/Alert Logic - Azure in the Cloud
Nimbo/Alert Logic - Azure in the CloudAlert Logic
 
लाल बहादुर शास्त्री
लाल बहादुर शास्त्रीलाल बहादुर शास्त्री
लाल बहादुर शास्त्रीKapil Luthra
 
Fotoflexer
FotoflexerFotoflexer
Fotoflexerskrolan
 
La Valutazione Economico Finanziaria
La Valutazione Economico FinanziariaLa Valutazione Economico Finanziaria
La Valutazione Economico Finanziariaberka
 
Ellies Nvq Presentation 1
Ellies Nvq Presentation 1Ellies Nvq Presentation 1
Ellies Nvq Presentation 1EllieNicholls
 

Andere mochten auch (7)

Expeditie mont blanc
Expeditie mont blancExpeditie mont blanc
Expeditie mont blanc
 
Menarcheal age, length dimensions and body composition in a sample of schoolg...
Menarcheal age, length dimensions and body composition in a sample of schoolg...Menarcheal age, length dimensions and body composition in a sample of schoolg...
Menarcheal age, length dimensions and body composition in a sample of schoolg...
 
Nimbo/Alert Logic - Azure in the Cloud
Nimbo/Alert Logic - Azure in the CloudNimbo/Alert Logic - Azure in the Cloud
Nimbo/Alert Logic - Azure in the Cloud
 
लाल बहादुर शास्त्री
लाल बहादुर शास्त्रीलाल बहादुर शास्त्री
लाल बहादुर शास्त्री
 
Fotoflexer
FotoflexerFotoflexer
Fotoflexer
 
La Valutazione Economico Finanziaria
La Valutazione Economico FinanziariaLa Valutazione Economico Finanziaria
La Valutazione Economico Finanziaria
 
Ellies Nvq Presentation 1
Ellies Nvq Presentation 1Ellies Nvq Presentation 1
Ellies Nvq Presentation 1
 

Ähnlich wie Alert Logic - Corporate Overview

MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? Jorge García
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesMuhammad Mudassar
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudAlert Logic
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alAlert Logic
 
ComResource Agency Solutions
ComResource Agency SolutionsComResource Agency Solutions
ComResource Agency SolutionsAnthony Dials
 
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesPartnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesSutedjo Tjahjadi
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Decisions
 
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...Sumo Logic
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabiltiesSneha .
 
ComResource Business Solutions
ComResource Business SolutionsComResource Business Solutions
ComResource Business SolutionsAnthony Dials
 
Blue Chip Tek Connect and Protect Presentation #1
Blue Chip Tek Connect and Protect Presentation #1Blue Chip Tek Connect and Protect Presentation #1
Blue Chip Tek Connect and Protect Presentation #1Kimberly Macias
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
ComResource - NW Agent Cybersecurity
ComResource - NW Agent CybersecurityComResource - NW Agent Cybersecurity
ComResource - NW Agent CybersecurityAnthony Dials
 
Information technology and information security services
Information technology and information security servicesInformation technology and information security services
Information technology and information security servicesDejan Majkic
 
Cyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data LtdCyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data LtdSabrina Chan
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environmentsamiable_indian
 
FireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudFireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudAmazon Web Services
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...Amazon Web Services
 

Ähnlich wie Alert Logic - Corporate Overview (20)

MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the Cloud
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
 
ComResource Agency Solutions
ComResource Agency SolutionsComResource Agency Solutions
ComResource Agency Solutions
 
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesPartnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
ComResource Business Solutions
ComResource Business SolutionsComResource Business Solutions
ComResource Business Solutions
 
Blue Chip Tek Connect and Protect Presentation #1
Blue Chip Tek Connect and Protect Presentation #1Blue Chip Tek Connect and Protect Presentation #1
Blue Chip Tek Connect and Protect Presentation #1
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
ComResource - NW Agent Cybersecurity
ComResource - NW Agent CybersecurityComResource - NW Agent Cybersecurity
ComResource - NW Agent Cybersecurity
 
Information technology and information security services
Information technology and information security servicesInformation technology and information security services
Information technology and information security services
 
Cyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data LtdCyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data Ltd
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
 
FireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudFireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the Cloud
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
 

Alert Logic - Corporate Overview

  • 1. Security and Compliance Powered by the Cloud
  • 3. Select Alert Logic Customers
  • 4. Security and Compliance Challenge IT organizations are faced with mounting pressure Compliance regulations PCI DSS, SOX, HIPAA, GLBA, NCUA, FFIEC, NIST, FISMA Continued evolution of network threats Alert Logic delivers cloud-based security and compliance solutions: Vulnerability Assessment Intrusion Protection Log Management Threat monitoring & incident response services
  • 5.
  • 6. no capital expense
  • 8.
  • 9. Vulnerability Assessment Schedule ongoing internal and external vulnerability scans Alert Logic is an Approved Scanning Vendor (ASV) for quarterly PCI scans Results integrate with intrusion protection for optimum accuracy Why Cloud?Centralized view of internal & external scan results for your entire network
  • 10. Intrusion Protection Automatically detect thousands of incidents with built-in correlation Protect your network with firewall and ACL based defensive actions Continuously updated to identify latest threats Why Cloud?Hosted expert system provides level of accuracy unmatched by hardware and software solutions
  • 11. Optional Monitoring Services 24/7 threat monitoring for rapid incident response Integrated incident and case management
  • 12. Log Management Collect logs from any syslog or windows source without agents Always-on, on-demand log storage Configure custom correlation rules and log alerts Why Cloud?Non-DBMS grid computing provides 10X+ faster search and reporting performance unmatched by appliance solutions
  • 13. Cloud-based Solution Instead of Deploying This: Deploy This:
  • 14. Cloud-based management redundant data centers, event processing and archival, analysis, reporting, compliance review and monitoring On-premise collection appliance based threat and vulnerability detection, log collection, compression, encryption and secure transport Cloud Architecture
  • 15.
  • 16.
  • 17. Passed PCI Audit and ensured customer confidence
  • 18.
  • 19.
  • 20. No capital equipment to purchase and maintain
  • 21.
  • 22.
  • 23. Makes log data available for analysis and forensics

Hinweis der Redaktion

  1. This is a testament to our Cloud-based model that any company from any vertical can take advantage of our solution.In addition if you are using a hosting firm to outsource some of your infrastructure – it’s worth pointing out that we are the preferred security and compliance offering of leading hosting companies like Rackspace, etc. Some customer anecdotes:GSI Commerce is one of the largest processors of ecommerce transactions in the world, they handle all ecommerce operations for some very well known brick & mortar businesses like Toys “R” Us, Radio Shack, Levi’s, Ace Hardware, National Football League, NASCAR, Reebok, etc. – We help protect GSI’s datacenter where their transactions are processed, and we help them comply with the Payment Card Industry security standard.Columbia College based in Columbia, MO, has 25,000 students on 32 campuses across the US. Like most education institutions, their network is highly distributed and constantly challenged with Internet-active students who contribute to a very target-rich network threat environment. We displaced Qualys at Columbia and protect their internal network from dangerous threats.Rackspace is a premier name in the managed hosting world and is the fastest growing managed hosting specialist in the world. Rackspace was the largest Cisco IDS customer in Texas until we came along and displaced Cisco as the internal network security vendor of choice for Rackspace’s thousands of customers.
  2. Although there are a number of reasons why our customers approach us to solve their IT security problems, the top two challenges they are trying to address are: Complying with regulations such as PCI DSS, HIPAA, and SOX. All of which require or suggest the use of Log Management, Vulnerability Management and Intrusion protection. Continued evolution of network threats Companies have to constantly protect themselves from never ending and evolving network threatsWe take the difficulty out of obtaining, achieving ,and affording compliance solutions by offering IDS, Vulnerability Management, and Log Management in a cloud-based delivery model. The cloud-based model removes the need to purchase expensive and complicated hardware and software solutions to buy and implement because all the infrastructure is deployed and maintained in Alert Logic’s redundant data centers.
  3. Our approach is simple.Our vulnerability solution will scan your internal and external network to indentify weaknesses before an attack occurs. Once a weakness is indentified our solution will provide the information you need to fix the vulnerability to ensure your network is protected. Finding missing patches Our IDS solution is constantly monitoring your network for security events. If an attack does occur our IDS solution will indentify the security breach and generate an alert to notify you where the attack is occurring. Discover worms or botnets that are difficult to detect using any other type of technology After an attack our log management solution enables you to perform forensic analysis on the log data to determine who did what, when and to whom. You can also use log manager to generate alerts based on your log data to identify suspicious activity on your network.Detect unauthorized access attempts to your networkAll of our solutions are delivered from the cloud, which means we can eliminate hardware, software, and maintenance costs. All of the infrastructure resides in the cloud and is maintained and supported by Alert Logic.
  4. One of the primary reasons our customers purchase our solution is to meet compliance standards. Our solutions cover the most expensive and labor intensive areas of compliance The following is a breakdown of the PCI and SOX requirements we satisfy with our solutions. For PCI we cover requirement 10, 11.2, and 11.4 which are the most costly and cumbersome to comply with. Examples: Vulnerability Assessment: 11.2 in PCI because Alert Logic is an Approved Scanning Vendor (ASV) for quarterly PCI scans Intrusion Protection: All mandates and regulations require or recommend an intrusion detection system. Log Management: We cover the majority of requirement 10 of PCI and DS 5.5 for Cobit. We make log review simple and automate the log management process.
  5. Our vulnerability assessment offering provides both internal and external scanning at no additional charge. If a vulnerability is detected in the scan we provide a report with recommendations on how to fix the problem.Why the cloud is better: For vulnerability assessment the cloud gives companies with a distributed network the ability to have a centralized view of the entire network, including both internal and external vulnerabilities.In addition Alert Logic is an Approved Scanning Vendor for PCI DSS quarterly scans. The PCI quarterly scan report can be submitted directly to your acquiring bank.
  6. Our Threat Manager solution includes intrusion protection which detects attacks in real time to protect . All of the alerts from our network appliance are fed directly into a centralized expert system hosted in our datacenter. The expert system's 7-Factor threat analysis correlates the IDS alert data with vulnerability data and real-time threat trend info from Alert Logic customers worldwide, and identifies only valid security incidents that threaten your network (our detection accuracy is greater than 99%), something a traditional standalone appliance simply cannot accomplish.7 Factors: Attacker Reputation, Nature of Exploit, Attacker Behavior, Target Asset Vulnerability, Target Asset Value, Global Threats Trends, and Attack confirmation.The cloud is better because our expert system provides a level of accuracy unmatched by on premise hardware or software based solutions.
  7. Alert Logic’s Active Watch is a threat monitoring service which provides an additional layer of network security. Our certified security experts will monitor your internal network and notify you directly if a security breach or incident has occurred.The active watch team works with our customers to help them resolve the security breach or incident.
  8. Log Manager was the first cloud-based log solution. With it, we collect, aggregate, and compress your log data and then perform all necessary processing and analysis in our data center, and send it back to you through our web-based UI.The cloud is better for log because our grid in the cloud provides 10X+ faster search and reporting performance unmatched by hardware or software based solutions.Ask your log vendor if they are using a relational database backend because it means that the search performance will be slower and less scalable
  9. In summary.Our cloud-based solutions are easy to buy, deploy and own. With Alert Logic you won’t have to pay hardware, software, or maintenance cost. An appliance based solution can not offer you the same savings. We enable regulatory compliance by providing IDS, Vulnerability Management, and Log Management. We improve network security by detecting security incidents and vulnerabilities along with making log data available for analysis and forensics.