Ooredoo provides managed security services to enhance clients' IT systems by optimizing asset utilization, risk management, and compliance. As a managed security service provider, Ooredoo has over 200 security professionals and a global security operations center to provide an end-to-end security solution. Ooredoo's services include managed firewall and security information and event management, advanced threat protection, managed security operation center services, and professional security services such as vulnerability assessment, penetration testing, and compliance consulting.
1. Powered by SecurView
Ooredoo Security
Managed Services
Removing cost, complexity
and risk from business operations
2. 20%
Technology
But 80%
Interpretation
360o
View
Of Global
Threats
200+
Dedicated
Security
Professionals
360o
View
Of Global
Threats
94%
Initial Cost
Savings
MSSP
Benefits
The Business Case for
Managed Security Services
Skills
Facilities
Staffing
Cost
We are
Built For
Big Data
Independence
Security
Awarness
SLA 15
Minute
Alert-High
Priority
events
Service
Ooredoo Cloud
Security Managed
Services
At Ooredoo, we enhance the operational efficiency
of our clients’ information systems with our Managed
Security Services. By optimizing IT asset utilization, risk
management and compliance, we improve uptime and
availability. As a Managed Security Service Provider
(MSSP), Ooredoo has a vision to provide end-to-end
security solution to its customers.
Ooredoo as an MSSP –
Customer Advantage
Reasons why:
• Cost efficient
• Security dedicated staffing & skills
• High Service performance
• Advanced facilities
3. Global Security Operations Center
VPN
SECURE
VPN
SECURE
All logs stay in the county
Customer Network
Business application monitoring
Managed
server
Managed
switch/router
Managed
firewall/
UTM/IDS
SOC Co-location center
TIER 3
Services Offered
1. Managed Firewall & SIEM
2. Managed SOC Services
3. Advanced Threat Protection and Malware Detection
4. Professional Security Services
• Vulnerability Assessment and Penetration Testing
• Web Application Security Testing
• Network Risk Assessment
• Firewall Migration Services
• Network Architecture Review
• Information Security Compliance Consulting – ISO 27001
• Business Continuity Planning (BCP)
Managed Firewall
& SIEM
Managing and monitoring security devices is a highly skilled
operation that can be a time consuming and resource intensive
process. Our managed security services allow our clients to
focus on their core business while we concentrate on providing
secured networks and systems.
The service we offer is 24x7 and is scalable, compliant and
cost effective. This service is designed for banking, government
and enterprise clients that wish to outsource Security Information
and Event Management services against strict SLA’s and
compliance requirements.
Features:
• 24x7 monitoring
• In-country log retention
• Real-time incident response
• ISO 27001, SANS 20
• Web-based dashboards and reporting
4. Advanced Threat
Protection and Malware
Detection
We defend our customer networks against threats by using a
market leading Next Generation Intrusion Prevention System
and deep integration into our SIEM platform (Powered
by LogRhythm) to provide multi-dimensional behavioural
analytics, extended visibility, and continuous monitoring for
real-time threat detection and response.
The Next Generation Firewalls which we support
or supply include:
• Palo Alto
• Cisco Sourcefire
• ThreatTrack
• Fortinet
Features:
The feature set summary is provided as follows:
• 24x7 monitoring & management
• Real-time incident response system
• Advanced malware protection and next generation IPS
• Packet level forensics and sandboxing
• Network behaviour analysis
• Integration with our next Gen SIEM for behavioural analytics
• Behavioural whitelisting
• Statistical base lining
• Real-time threat management
• Continuous Compliance
• Host & network forensics
• Real-time contextual awareness
Managed SOC
Services
Technology itself is not enough; an efficient Security
Operation Centre team requires a critical balance of people,
process and technology. We partner with LogRhythm to
empower our customers to leverage their existing SIEM
investments by providing a 24x7 monitoring service offering.
The Operational Challenge
SOC operations require highly skilled security professionals
to investigate security incidents, perform incident response
and forensics, and help keep an organization afloat amid
a data breach. An enterprise looking to operate an SOC
needs to evaluate whether it has the expertise in-house to
deliver effective monitoring or transfer the risk to a specialist
SOC operator. We can offer the necessary services to
support these challenges
What is included?
Security Services Feature Set Monitor
Threat Management
24x7 Proactive Security Incident
Monitoring, Detection & Notification
SIEM Event Management & Correlation
Security Policy Consultation
Configuration
Management
Maintain Device Inventory Database
Backup of Device Configuration
Fault Management
Availability Monitoring
Fault Detection & Notification
Change
Management
Maintain Documentation
Reporting Reporting
Web Portal
Web Based Portal
Access to Threat Feeds
Log Retention Log Management and Archival
SLA
15 Minute Response Time
Service Credit Bank
Dedicated Account
Manager
Dedicated technical account Manager
5. Network Risk Assessment
• Comprehensive documentation and presentation
of findings
• A prioritized list of remediation steps with practical
recommendations focusing on both the risk and cost
associated with it
• Action plan – short and long-term to achieve compliance
and business objectives
Firewall Migration Services
Firewall technology longevity typically lasts between 5
to 7 years and upgrades are often initiated by growing
organizations and changing security requirements. A
firewall is an item of critical network security infrastructure
and any change in technology is fraught with risks to
business continuity.
Our professional services team can assist organizations from
applying a standard methodology to executing a firewall
migration. Each migration project deployed is unique and
represents a different set of challenges. The key to our
success lies in treating each case with the same level of care
and professionalism.
Professional Security
Services
Vulnerability Assessment and Penetration Testing
• A robust policy template to enable security configuration
compliance
• Compliance-based reports (PCI, HIPPA, GLBA, FISMA
and SOX)
• Customizable, multi-view reports that make the most
of existing security investments
• Audit-read reporting and certified technical support teams
• Internal and external vulnerability scans
• Best practices (ITIL, OSSTMM and ISO 27001
security standard)
• Instant access to Secure-I security intelligence and research
Web Application Security Testing
• Identification of technical and logical vulnerabilities such
as SQL injection, cross-site scripting, I/O data validation,
exception management etc.
• Ability to determine remediation steps and counter-measures
• Detailed technical information report covering the nature
of the defect, the code locations, impact of defect and the
remediation solutions
Black Box Testing Grey Box Testing White Box Testing
We perform attack
testing assuming the
identity of an external
attacker/hacker
Grey Box testing is
a fusion of black
white box tetsing
Full source code
infrastructure review
With no inside
information about the
application
We receive basic
information about
design function of
the Web app
We receive complete
information, coding,
infra, architecture
6. Information Security Compliance Consulting –
ISO 27001
The Information Security Management System (ISMS)
provides a control framework to protect information assets.
This combines management controls, technical controls,
procedural controls and personnel controls to name a few.
The controls combine preventive, detective, restorative,
maintenance and monitoring controls.
Consultancy and implementation on ISMS main domains:
• Security policy
• Organization of information security
• Asset management
• Human resources security
• Physical and environmental security
• Communications and operations management
• Access control
• Information systems acquisition, development
and maintenance
• Information security incident management
• Business continuity management
• Compliance
Network Architecture Review
Our consultants analyze every key aspect of the architecture
including:
• Logical and physical design
• Security technology inventory
• Asset inventory
• Outbound and inbound connectivity
• Security procedures and processes
• Network topology
• Network and host access controls
• Log-in procedures and authentication requirements
• Business continuity plans
• Containment and incident response procedures
• Health of security controls
7. Business Continuity Planning (BCP)
BS 25999 is BSI’s standard in the field of Business Continuity
Management (BCM) and can be applied to any organization
in any location globally. We are specialists at applying
this standard, which includes guidance on the processes,
principles and technology recommended for BCM and the
specification of a set of requirements for implementing,
operating and improving a BCM System (BCMS).
Planning for:
• Random failure of mission-critical systems
• Epidemic
• Earthquake
• Fire
• Flood
• Cyber attack
• Sabotage (insider or external threat)
• Hurricane or other major storm
• Utility outage
• Terrorism/Piracy
• War/civil disorder
• Theft (insider or external threat)
ooredoo.qa