Beruflich Dokumente
Kultur Dokumente
Presented to:
CCAP
TechNet Quarterly Meeting
+ =
Operating unit of Verizon Global leader with full range of Largest global provider of managed
Communications – ranked 13th in security & compliance services information security services
U.S. Fortune 500 18+ years of focused experience Over 1,100 security professionals
Advanced voice, data, securing critical data and worldwide
IP, IT and wireless solutions for protecting identities Mature solutions to address: -
large business and governments Mature set of managed & all layers of technology stack -
One of the largest and most secure professional services for threat, security/compliance processes -
global IP networks serving 2,700 compliance, vulnerability, forensics enterprise risk management -
cities in 150 countries & identity management cloud-to-core security
Manage networks and/or security for Client-driven approach: - Practical & customized approach with
over 4,000 enterprises and product-neutral - solutions tailored to your
government agencies around the sourcing-neutral environment and needs
world ICSA Labs – in-depth security Global delivery capability
Global network security intelligence product testing & certification Global infrastructure (7 SOCs, large IP
network)
Deep security intelligence sources
Application
Business Applications Security
Services
Applications
Management
Services Application Servers
(Remote/Smart Center)
Data Privacy
Managed
Database/Data Privacy services
Hosting
Services
HW Platform, OS, Storage
Identity
Services
Managed
Network LAN/WAN Network Access Managed
Services Security
Services
Colocation
Services Facility/Infrastructure
Establish and maintain Assess, design, build, or augment Improve the efficiency & accuracy
key portions of a security and critical components of a security of automatable, high-volume
compliance program and compliance program components of security program
(outsourcing or co-sourcing)
Regulatory Compliance
Vulnerability Management Planning & Decision Support
Vulnerability Management
Security Monitoring / Mgmt Vulnerability Management
Identity and Access Mgmt
Regulatory Compliance Identity and Access Mgmt
(Digital Certificates, PKI)
User Authentication/PKI User Authentication/PKI
Business Partner Security
Forensics and IR Regulatory Compliance
Application Security
Forensics & IR
Risk Assessments
Security Monitoring & Logging
Quantitative Risk Modeling
Policy Development & Enforcement
Operational Roadmapping
County’s Objective:
Conclusion:
The county will see an increase in production with a more efficient WAN
that allows them provide Video, give them better functionality with 4-digit
dialing between locations and gives them a centralized Voice Mail system.
They will see a decrease in Telco cost as their Local and Long Distance
usage will become a fixed cost.