You are on page 1of 2

Vulnerability Management

IKON Corporate Security Services


datasheet

IKON Corporate Security Services provides organizations with the ability to reduce
exposure and manage threats by providing a comprehensive suite of security services,
designed to manage the Confidentiality, Integrity and Availability of your data and
services.

A comprehensive Vulnerability Management process involves identifying and quantifying


vulnerabilities across your systems, reducing these vulnerabilities and improving the
capacity to manage future incidents.

IKON Vulnerability Management automates the process of vulnerability management


and policy compliance throughout the enterprise, providing network discovery,
mapping, asset prioritization, vulnerability assessment reporting, remediation and
remediation tracking according to business risk.

Keross offers Corporate Security Services including Vulnerability Management in a


Software-as-a-Service model, allowing our customers to have the same state-of-the-
start enterprise level services at a fraction of the cost.

IKON VM is easily scalable to cover organizations of all sizes and distributed across
multiple geographical locations and sites.

Features
ƒƒ Automate vulnerability identification
ƒƒ Prioritize remediation based on risk to business operations
ƒƒ Document regulatory compliance via automated agent-less auditing
ƒƒ Comprehensive vulnerability KnowledgeBase incorporates thousands of unique checks
ƒƒ Six-sigma accuracy of detection
ƒƒ After-hours, scheduled remediation performed by certified experts

“ IKON VM provides Mondial Assistance ƒƒ Customized reporting & dashboarding


with a 24x7 visibility on security & availability ƒƒ Well defined SLAs and Service Management
of our data. The Keross SOC monitors and
manages our devices round the clock to Benefits
ensure that our systems are scanned,
patched and available securely throughout ƒƒ Manage, reduce & mitigate business risk
the day, while our team focusses on


ƒƒ Ensure compliance with laws, regulations and corporate security policies
strategic projects. ƒƒ Measurable ROI with lower OPEX and no CAPEX
— Frederic Jesupret ƒƒ Monthly reports with full status and service summary
Telecom & Security Manager ƒƒ Flexible customer-oriented pricing structure
Mondial Assistance, France ƒƒ Alignment of IT & core business objectives
ƒƒ Business Dashboards

For more information or a free trial, contact us: info@keross.com

© 2010 Keross LLC


datasheet
Vulnerability Management
IKON Corporate Security Services

Executive Dashboards & Reports Automated Policy Management


• One quick view to govern real-time exposure • Manage auditing, reporting, compliance needs of PCI, ISO 27001, HIPAA,
• Automated vulnerability trend analysis & differential reports GLBA, SOX, etc
• Export reports to HTML, MHT, PDF, CSV and XML formats • Automated Self-Service Payment Card Industry
and more… • (PCI) compliance certification

24x7 Remediation Management Vulnerability Management Architecture


The Keross Security Operations Center (K-SOC) provides patch
management services to help remediate vulnerabilities and threats.
Automated patch management techniques suffer from a non-human Centralized IT Teams
View dashboards, reports
element and lack of roll back. The K-SOC: Customer Architecture
Receive alerts, remote control
On-site support
• Establishes patch management & mitigation plans
• Determins QA environment for first roll-out of patches
• Monitors QA devices to validate patches 6 AL
ERT
4
ORT S
• Rolls out patches to production S UP
P

• Provides 24x7 service with a pool of 20 experts 1 2 7 1


7 EXTERNAL IP SCANS
Probe + Scanner

Process Quality Management MITI


GATION S,
AL
ERT
S SOC Central Servers
(external VM scanners)

IKON PQM provides a portal for conducting online audit and reporting 5 RE
PORT 3
activities as well as managing and maintaining enterprise progress in End users Keross Security Operations Center
Report analysis, mitigation strategy
terms of regulations, policies and procedures. Progress and performance Remediation of vulnerabilities
can be measured against industry indices and benchmarking, supporting Level I, II, III Support

long-term risk mitigation. All K-SOC activity around Vulnerability


Management is provided within PQM to ensure:
1. Internal/External scanners run non-intrusive scans to detect vulnerabilities
• Enterprise wide monitoring of staff activities related to standards and 2. IKON Managed Services monitor all critical devices while awaiting remeditation
operating procedures 3. K-SOC analyze, provide filtered reports to the customer for validation
• Reporting, tailored to individual roles and functions 4. K-SOC provides mitigation strategy
• Collaborative task management 5. K-SOC remediates vulnerabilities, configuration and permissions, manages patches*
• Ability to publish policies and tasks in multiple languages 6. K-SOC, IT teams maintain availability of devices during remediation process
• Proactive quality assurance 7. Internal/External scanners run second report to validate remediation

Summary of Vulnerabilities Audit Results, Action item Summary

Additional Services
• Web Application Scanning • Mail Security, Archiving Services • Log Management
WAS provides automated crawling & testing for custom web IKON Email Security Services provide high protection IKON SIEM is a comprehensive digital security platform that
applications to identify most vulnerabilities such as those against E-mail, Spam, Virus alongwith Business Continuity uses alarms and indicators to manage & prevent security
in the OWASP Top 10 and WASC Threat Classification, with live archiving, Bandwidth management without risks by collecting & storing logs to analyse any type of
including SQL Injection and Cross-Site Scripting. hardware or software. event.

web www.keross.com twitter @keross


news keross.com/news.html blog keross.com/synchronicity

© 2010 Keross LLC


San Francisco • Paris • Dubai • Kolkata

You might also like