• No results found

Alcatel-Lucent Services

N/A
N/A
Protected

Academic year: 2021

Share "Alcatel-Lucent Services"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

(1)

SOLUTION DESCRIPTION

Alcatel-Lucent Services

(2)

Introduction

Security is a sophisticated business and technical challenge, and it plays an important role in the success of any network, service or business trans-formation. The increasing number of threats and vulnerabilities, and evolving security technologies and regulatory compliance requirements have many companies looking for a trusted advisor to help them manage risk. Alcatel-Lucent’s security solution delivers extensive knowledge, expertise and security technologies to protect network and system infrastruc-tures and information. This solution helps enterprises, service providers and governments understand and address their security requirements, identify vulner-abilities, reduce risks, and defend against and respond to attacks.

The Alcatel-Lucent security solution is comprised of both services and products. Alcatel-Lucent’s Security Consulting services are built on a foundation of industry standards and best practices, and help customers improve their security policies, practices and use of technologies. Leading-edge technologies, ranging from Alcatel-Lucent’s VPN Firewall Brick and Vital software portfolios, as well as features embed-ded in Alcatel-Lucent’s OmniSwitch IP Networking portfolio, and strategic alliance partnerships deliver superb price/ performance with productivity-enhancing features that simplify security management.

Alcatel-Lucent, as a global partner, understands complex security requirements and issues inherent in next-generation networks and services, and can help customers safeguard the future of their businesses.

Security Consulting and Integration D E F I N I T I O N A N D D E L I V E R A B L E S

Alcatel-Lucent security consulting and integration services help organizations identify, manage and mitigate risks, while maximizing the benefit of their security investments. Alcatel-Lucent certified security professionals have the firsthand knowledge and industry experience to understand customers’ challenges, develop their security strategies, and augment their in-house capabilities.

These services are especially beneficial for customers deploying new architectures where security risks require special design considerations and hardening of solutions. Increasing Internet activity, along with the use of VoIP and broadband services, wireless connections and other new technologies drive these security requirements. Alcatel-Lucent security consulting and integration services can be customized to meet customers’ needs in several areas.

S E C U R I T Y A S S E S S M E N T S E R V I C E S

Security Assessment services review your policies, practices and systems to identify threats and vulnerabilities within your organization and/or infrastructure (e.g., network, applications, services or policies). This may be accomplished via a traditional risk assessment or policy gap analysis, or through different forms of testing to discover vulnerabilities, from design and architecture reviews to vulnerability assess-ments and penetration tests. We provide you with a summary of all findings and/or testing results, as well as prioritized recommendations for a mitigation strategy. This information proves useful when you are defining future security require-ments or initiatives.

W H AT W E D O

(Some or all of the activities may apply, depending on the type of assessment desired.)

• Review your security policies and understand their current application through interviews and audits

• Perform applicable security testing

• Assess the current security technical architecture through network device hardening and conformance to policy • Conduct vulnerability testing

• Reproduce real-world attack scenarios to identify and exploit vulnerabilities (penetration testing)

• Perform policy gap analysis for existing policies, practices, standards or procedures documents based on industry standards as a framework

• Analyze inputs to identify and prioritize network and organizational vulnerabilities

W H AT W E D E L I V E R

(Some or all of these activities may apply, depending on the type of assessment desired.)

• Network scanning results and interview summaries • Documentation of baseline security posture • Policy document inventory summary • Prioritized threat matrix

• Tailored mitigation recommendations

Security Strategy, Policy and Compliance Services

Security Strategy, Policy and Compliance services help you develop your security strategy, from defining your overall security program policies and standards, to guiding the imple-mentation of your security policies and procedures with your staff. Additionally, we can help you address compliance readiness or remediation needs to help you achieve compliance and meet your business goals.

W H AT W E D O

(3)

• Identify gaps between applicable standards (e.g., ISO 27001, ISO 17799, ITU-T X.805) or compliance require-ments (e.g., NERC CIP, Sarbanes-Oxley, Basel II, PCI), and your current security posture

• Document security policy findings and security requirements • Formulate and document security policies

• Plan, design, implement and maintain an incident response program and operational processes for handling incidents

W H AT W E D E L I V E R

• A baseline understanding of your environment with documented security policies and high-level recommen-dations for security improvement

• If applicable, a compliance readiness report, including a gap analysis with recommendations for remediation • A well-formed incident response policy and functional

architecture based on industry best practices, as well as process documents

Security Architecture Design and Integration Services

Security Architecture Design and Integration services develop security architectures and detailed designs based on your business drivers, security policies and industry best practices. The services also deliver the implementation and testing of security network and/or IT architecture solutions.

W H AT W E D O

• Analyze business drivers and security requirements • Create security architecture using best-in-class security

components and policies to include segmentations, logical controls, functionality

• Develop design documentation, including detailed specifica-tions on equipment/appliance design and requirements (including hardening), traffic flow/ controls, and manage-ment, monitoring and alarm functions

• Develop security implementation, integration and test plans • Perform all security implementation and testing activities, with minimal impact to operations in migration scenarios • Verify the security components' implementation and

hardening, and perform acceptance testing procedures

W H AT W E D E L I V E R

• Detailed security architecture showing diagrams, services, interfaces and IP address mapping

• List of recommended security components (equipment, appliance and applications)

• Detailed security design documentation, including device configurations and deployment guidelines

• Implementation, integration and testing results documentation

• Updated as-built design documents for services, architecture and configurations

• Acceptance document and issue-tracking report • Recommendations for further security component

enhancements, if any

Business Continuity/Disaster Recovery (BCDR) Services

Business Continuity/Disaster Recovery (BCDR) services plan for and enable the secure continuity of operations. Specific activities may include business impact analysis, risk assessment, gap analysis, BCDR plan design and development, and plan testing/maintenance.

W H AT W E D O

• Identify deviation from BCDR policies and industry best practices

• Identify impacts of potential risks to the networks and other aspects of the business, and quantify impacts in financial terms

• Identify BCDR vulnerabilities and recommend improvements • Develop a BCDR plan tailored to your business needs • Design an incident command structure to plan site incident

management and recovery teams, as well as executive and customer communications

• Thoroughly test your BCDR plan and train your staff

W H AT W E D E L I V E R

• Complete report of all findings, best practices and recovery planning suggestions

• Complete analysis package, including rating and ranking of risks, threats and vulnerabilities

• Documented BCDR plan

• Documented templates for your site incident management and recovery teams’ planning and use, as well as training and awareness materials

• Documented BCDR test exercise plan and testing results • Tailored mitigation recommendations

Threat Management Services

(4)

W H AT W E D O

• Analyze broader threat activities, and assess which vulnerabilities are applicable to your environment and the potential service impact

• Provide 24/7 monitoring and customized reporting • Perform trending and analysis of logs and security

threat activities

• Provide event notification and recommendations for mitigation strategies or corrective measures • Handle escalations for incident handling and crisis

management as needed

W H AT W E D E L I V E R

• Vulnerability assessment and scanning reports • Attack simulation and service impact analysis • Real-time advisories

• Security event notification through log file correlation and analysis

• Customized reporting through web portal

Security Consulting and Integration Methodology

Alcatel-Lucent’s people, knowledge assets and methodology deliver superior results for security solutions:

• Unparalleled experience and global expertise with more than 25 years in high-security wireline, wireless, voice and data

¬ Highly-skilled consultants, including 85+ CISSP/ ISO 27001 experts and Master Recovery Planner credentials ¬ 1,000+ security engagements spanning service

providers, enterprises, and government

• Pioneering research and industry leadership, including security patents and key roles in leading advisory and standards bodies related to security

• Multivendor, end-to-end capabilities with experience across more than 450 products of 100 best-in-class vendors

Alcatel-Lucent Security Products

VPN Firewall Brick Portfolio

Portfolio of fully integrated IP services security appliances for security resource management

F E AT U R E S

• Centralized management through the Alcatel-Lucent Security Management Server

• Fully redundant: no single point of failure • Plug-and-play: flexible deployment options • Distributed architecture approach

• High performance and QoS solution

W H AT W E D E L I V E R

• Layer 2 and Security Zone Concept • RBR routing, VoIP patented technology • Highly secure solution

• Features and OS parity

VitalAAA for AAA Servers

High-performance access policy management for WWAN, WLAN, switched, dialed, DSL, VPN and other controlled network access applications

F E AT U R E S

• Provides authentication, authorization and accounting (AAA) services for network access elements

• Access user information stored in local databases and directories

• Track, manage and limit active sessions

• Risk Assessment • Business Impact Analysis • Gap Analysis

• Vulnerability Assessment • Penetration Testing • Secure Architecture Review • Compliance Readiness

• Security Policy and Program Development • Security Architecture and Design • Security Policy and Integration • Business Continuity Planning • Threat Prevention and Management

• Security Monitoring

• Crisis and Incident Management

• Hardening and Remediation • Deploy Security Systems/Elements • Business Continuity Plan Testing

(5)

• Provides a single, cohesive access policy for the entire network from a single platform

• Save usage data to virtually any database or file format desired

• Interfaces with other AAA systems for roaming

W H AT W E D E L I V E R

• Single management point for managing access policies for all network access media

• Compressive reporting, logging and error, fault and alarm management

• Integration with existing HR and customer care systems • Excellent performance on low-end hardware

• Complete training and professional services • Solid standards compliance

VitalQIP DHCP/DNS IP Address Management Software

IP address management software to enhance profitability and productivity

F E AT U R E S

• Configuring network nodes with IP address, mask, gateway, etc.

• Monitoring address usage to ensure efficient deployment • Configuring DNS servers with each node’s name and

IP address

W H AT W E D E L I V E R

• A consistent, accurate IP name and address inventory • High availability for clients/subscribers

• Ability to manage diverse DHCP/DNS infrastructure • Scalable IP management architecture

• Easy-to-navigate GUI

OmniVista 2770 Quarantine Manager

A network management application providing network quarantine security by improving and simplifying network protection through a unified network management and security platform.

F E AT U R E S

• Converging network management and network security • Prevents network access by noncompliant users

• Ability to isolate noncompliant user based on IPS/IDS intrusion notification

• Isolate noncompliant users, either at edge, core, branch or wireless

• Supervision and management tools for network managers

W H AT W E D E L I V E R

• Open solution: interfaces with any third-party devices’ IDS/IPS Syslog

• One-touch solution to deploy and operate • Complete automation or manual operation

Access Guardian

A comprehensive set of security features embedded in Alcatel-Lucent’s OmniSwitch IP Networking portfolio.

F E AT U R E S

• Switches provide “auto-sensing authentication” • Host integrity (NAC) - switches enhance various

NAC enforcement methods (MNAP, etc.)

• sFlow-enabled switches provide visibility to network patterns and security threats

• Role-based access - wire-speed ACL and QoS policies aid in limiting user traffic to appropriate areas • Switches enabled with Quarantine Manager disable

intruders at the network edge

Solution Customer Benefits

The Alcatel-Lucent security solution helps you balance the risk, cost and quality concerns associated with protecting your infrastructure, services and information. Alcatel-Lucent provides customized solutions, from serving as a trusted security advisor to managing your security so you can focus on your core business.

Choose Alcatel-Lucent’s security solution to help: • Mitigate risk and liability

• Protect corporate reputation/brand, and build trust with end users and business partners

• Manage threats proactively, and prevent network downtime and/or security incidents

• Enable compliance with regulatory or business partner/ customer requirements, thereby avoiding financial penalties due to fines, violations of service level agreements, etc.

• Accelerate the secure use of new technologies with proven expertise

• Obtain an independent, third-party review of the effectiveness of security measures used to protect your infrastructure, services and sensitive data as well as mitigation strategies

• Enhance staff productivity and build security operations expertise with shared resources and facilities (which also optimizes OPEX/CAPEX)

(6)

www.alcatel-lucent.com

Alcatel, Lucent, Alcatel-Lucent and Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other trademarks are the property of their respective owners. The information presented is subject to change without notice. Alcatel-Lucent assumes no responsibility for inaccuracies contained herein.

References

Related documents

Ramírez Heredia ha situado su novela en el corazón de una frontera tan importante como la que conduce a los indocumentados hasta EEUU, y que supone una escala importantísima en

Trend Following: Empirical Findings of Diversification by Less Liquid Markets Abstract: In this paper, we highlight a specific factor of capital allocation: inclusion

Figure 4.2, represents the box-plots of the number of correct guesses by respondents for different groups of pairs of graphs with a different Hurst exponent between the graph pair..

Our project provides various services to the customer like booking (advance/current), cancellation of advance booking, enquiring about any customer (by name/customer Id) or

On roll call the following members were present: Jane Boyle, Paul Stock, Jim Hessel, Daniel Call, Dick Weller and Lee Baranowski. Also present was Julia Bennett, Court Reporter

Figure 1 — Measured throughput, defined as the ratio of file size to the file transfer time, for the transfer of different size files at different channel data rates. The “2M

While longitudinal cohort studies and randomised controlled trials will provide the best data to answer questions concerning the safety and efficacy for smoking cessation of EC

Failure Success Failure partial success partial success Failure Explanation of implement ation result based on the suggested Model Unsatisfactor y facilitating