Level3 - Intelisys
Download
Report
Transcript Level3 - Intelisys
Level 3 Managed Security Solutions
Overview
Polycom event Security Briefing
12/03/14
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.
The security problem of today’s environment
Changing Business Models
Evolving Threat Landscape
Complexity and Fragmentation
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.
2
"Digital business – characterized by
cloud, social, analytics, mobility
and IoT - is an unstoppable and
irresistible catalyst for change;
change that will affect the
fundamental foundations and
baseline assumptions of every
business…creating significant
security implications.”
-- Gartner, 2014
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.
3
Security is a critical component of our comprehensive portfolio
DATA NETWORKS
• Private Line, Wavelength
and Ethernet Transport
• MPLS VPN and VPLS
Solutions
SECURITY
APPLICATION
PERFORMANCE
VOICE AND UC&C
• Managed Security: (MFW,
IDS/IPS, Web Filtering,
DLP, Incident Response)
• Internet Services
• WAN Optimization
• Voice
• Vyvx® Solutions
• Website Acceleration
• Contact Center
• DDoS Mitigation
• Content Delivery Network
(CDN)
• Dark Fiber and Managed
Fiber
• Secure Access
• Managed Network Services
• Threat Analytics
• Cloud Connectivity
• Log Management
• Data Centers
CONTENT
DISTRIBUTION
• Unified Communications
and Collaboration
• Audio, Video and Web
conferencing services
• Security Consulting
• SIEM
• Managed Hosting Services*
Managed and Professional Services
*Available in Latam and EMEA today
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.
4
Level 3 Security Operations Center (SOC)
Responsible for Securing Our Global IP Network
140,000
•
24 x 7 x 365 support, providing always on
monitoring and management
•
Provide managed security solutions backed
by our people, systems and data
•
The same team charged with protecting Level
3’s global infrastructure will be monitoring and
managing your security solutions
•
Our network and visibility into threats provides
our security team with exceptional data – we
leverage this information to protect your
assets
ROUTE MILES
120,000
NETWORK ELEMENTS
20,000+
ENTERPRISE
CUSTOMERS
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.
5
Level 3 Security Operations Center
Provided With Exceptional Visibility In To A Dynamic Threat Environment
1000
Command and
Control Servers
350,000
Alerts Per Day
1+ Million
Malicious Packets Per Day
1.7+ Million
Infected Machines
with proprietary threat intelligence systems
36+ Billion
Netflow Sessions Per Day
40% OF
THREATS
DETECTED
WERE PREVIOUSLY
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.
UNKNOWN
6
Level 3 Security Strategy
Enabling enterprises to address increasingly complex Security
challenges through network and cloud based security solutions
Accelerate
Organic
Growth:
Secure all
Network
customers
Increase attach-rate of
Managed Security Services
to Network sales through
targeted marketing
Differentiate
Level 3℠
Security
Solutions
Extend Level 3’s unique
threat intelligence to our
customers, enabling
informed security
decisions and more
control
Focus on
Cloud-based
Services
Expand
Addressable
Market
Enable customers to
Serve more customers
migrate to more scalable through new products and
Security solutions, with geographic expansion
less operational impact
and robust protection by
Level 3
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.
7
Protecting the Networked World
Cyber attacks on the Enterprise are occurring on multiple fronts. A holistic, multilayered approach is needed to manage risk to brand and intellectual property
Secure Connectivity
– Locking down network and Internet connections
– Securing remote access
Secure Cloud
– Extending border security to include cloud
– Threat mitigation
Secure Mobility
– Maintain secure connectivity and productivity on the
move
– Protecting employee BYO Device
Secure Web
– Safeguard online business
– Content encryption, authentication, SSL
Security Consulting
– Risk analysis, compliance audit readiness
Security Operations Center
– 24 x 7 monitoring and mitigation by experts
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.
8
Level 3SM Cloud Security Solutions
What Makes Level 3 Unique?
Advanced SOC: 24 x 7 SOC that can cost effectively monitor,
track and mitigate threats, utilizing the expertise and knowledge
gained from protecting Level 3’s global network/infrastructure
Unmatched Attack Traffic Visibility: A global network backbone
with visibility in to attack traffic and advancing threats (IP, DNS,
CDN)
Comprehensive Internal And External Security: global security
provider responsible for securing both your network and cloud
based infrastructures, providing physical (network), logical (IP)
and content security
Proactive Versus Passive Mitigation: Ability to be more
proactive, using our data and analytics to see threats forming
while taking proactive measures ahead of an attack or more
quickly mitigating an attack if/when one does occur with our
visibility, control and data
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.
9
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.
10