A HELPING HAND
TO PROTECT YOUR
INFORMATION SECURITY MATTERS
LAYERS OF PROTECTION
ON GUARD WITH OPTUS
THREE STEPS TO SECURITY PROTECTION
WE WANT TO HELP YOU EVERY STEP OF THE WAY
Emerging technologies have helped
organisations, particularly SMEs, to work
smarter and to create new business
opportunities. But these technologies
have also created new risks. There is
now increased potential for IT security
breaches and misuse of customer data
– with the associated risk of to your
company’s reputation and brand.The Optus Future of Business Report 2013 revealed that organisations are expanding the way they connect with customers. Social networks and devices such as tablets and smartphones are driving greater social and digital integration. This highlights the need to have up-to-date, context-aware firewalls and endpoint security.
Security is a core part of any conversation about cloud, social media, mobility and data centre transformation. Given the high profile of these market trends, security should be at the forefront of CIO’s minds.
Also, organisations have obligations under the Privacy Act 1988 to put in place reasonable security safeguards and to take reasonable steps to protect the personal information that they hold.
In June 2013, a new mandatory data breach notification bill was tabled in the Senate. It requires organisations to notify the Privacy Commissioner and affected consumers when a data breach occurs. Fines could be imposed on organisations and individuals. This would make the need to adopt a robust IT security architecture even more important.
RESPONDED THAT DEVELOPING
A STRATEGY FOR IMPROVING
SECURITY AND RISK MITIGATION
WAS HIGH TO CRITICAL PRIORITY.
THE AUSTRALIAN STATE OF THE
CIO STUDY 2013
A RECENT DATA BREACH INVESTIGATION REPORT HIGHLIGHTS
SOME STARTLING FINDINGS:
Source: 2013 DATA BREACH INVESTIGATIONS REPORTverizonenterprise.com/DBIR/2013
OF BREACHES WERE SPOTTED
BY AN EXTERNAL PARTY
USING EMAIL, PHONE CALLS
AND SOCIAL NETWORKS TO GAIN
INFORMATION ON INDIVIDUALS
OFTEN IGNORED, BUT
CONTRIBUTED TO 29% OF
OF BREACHES TOOK MONTHS OR
EVEN YEARS TO DISCOVER
More than ever before, businesses
are facing external threats that can
compromise their business. Security
threats are not only growing but are
more complex and sophisticated.
The bring-your-own-device (BYOD)
trend is increasing exposure to
vulnerabilities, because many
organisations are adopting a mixed
personal and business-use device
These factors are coupled with the
imperative to protect data privacy,
data security and intellectual property.
TOP OF MIND
OVER HALF OF THE
OF OLD ACCOUNTS
OR BACKDOORS THAT
OF NETWORK INTRUSIONS
EXPLOITED WEAK OR STOLEN
CREDENTIALS. STRICT POLICIES
ARE REQUIRED TO REDUCE THIS
EASILY PREVENTABLE RISK.
DATA AND IP
MIXED USE BYOD
PROTECTIONOrganisations need to adopt a multi-layered,
holistic approach to manage today’s threat landscape. You need to identify the critical assets that need protecting, and the levels of protection required. This helps you understand the level of security necessary across different parts of the organisation.
Optus believes that a proactive security posture is necessary to prevent data loss — this strategy should encompass people, processes and technology.
People and Identity
Data and Information
Vulnerability Assessment and Penetration T
Application & Web Application Security
Email, Web and Data security
Distributed Denial of Service
Intrusion Detection and Prevention
Firewall / Secure remote access
Security Policy and Information Event
Management Monitoring and Reporting
OPTUS’ SECURITY SERVICES
• INTRUSION PREVENTION
• WEB, EMAIL AND INFORMATION CONTENT
• ENDPOINT PROTECTION
• DISTRIBUTED DENIAL-OF-SERVICE
• VULNERABILITY ASSESSMENTS
• SECURITY EVENT MANAGEMENT.
Our monitoring services provide rapid detection of security incidents and vulnerabilities for proactive remediation.
HOW DO I CONNECT SAFELY
TO THE WEB?
• Firewall/intrusion prevention/SSL VPN • Remote SSL VPN
• Authentication./access management
HOW DO I DEAL WITH THE SOCIAL
• Email, web and data content security • Secure web gateway
• Application security
HOW DO I DEAL WITH THE
• Mobile device security
• Data loss prevention and protection • Data encryption
• Anti-malware/SPAM protection
A BUNDLE FOR
We can help you on your security journey to protect your brand and reputation.
ASSESS YOUR RISK WITH A
Automatic vulnerability scanning of online traffic coming into and leaving the customer internet gateway. Using a network connected appliance, this is a non-intrusive span TAP/ mirror port on the network
Customers can expect:
• Vulnerability assessment report • Risks and recommendations report At NO charge*
* Vulnerability Assessment is based on Optus’ Introductory Online Cyber Threat Vulnerability Assessment Service.
UTILISE LOW COST AND
RELIABLE OPTUS UECOMM
INTERNET FOR CONNECTIVITY
Fast, secure internet service is essential to modern business:
• Permanent, reliable internet connection with static IP addresses • Supported by Optus Uecomm
Ethernet VPN service
• Choice of bandwidth you want from a range of access services
• Bandwidth scalable as your business grows
• Detailed reporting capability to manage growth.
PROTECT YOUR BUSINESS WITH A
MANAGED SECURITY SERVICE
Choose from a variety of managed security solutions including:
• Firewall/intrusion prevention/ SSL VPN
• Remote access security/SSL VPN • Authentication and access
management (IAM) • Email, web and data; hybrid
secure gateway and cloud • Mobile device security/ endpoint
• Application security management/ load-balancing • Security event management/
A RISK AND VULNERABILITY ASSESSMENT
CAN HELP YOU UNDERSTAND YOUR CURRENT
SECURITY POSTURE AND GUIDE YOU TO A
SECURITY IMPROVEMENT PLAN THAT HAS THE
RIGHT BALANCE BETWEEN EXPENDITURE AND
We can help you start your journey towards
greater protection if:
• Your lines of defence are compromised • Your existing security measures aren’t
addressing current risks or
• There are weaknesses in your IT security defences
Early detection enables you to proactively
reduce risk exposure. Optus’ security
assessment services include:• Security policy review; roles and
• Network vulnerability assessment (external and internal)
• Penetration testing
• Report and remediation proposal • On-going periodic automated monitoring
WE WANT TO HELP YOU
EVERY STEP OF THE WAY
We’ll help to identify critical ICT security risks and recommend appropriate controls to better protect your people, customers, information, processes and technology.
ARCHITECTURE DESIGN SERVICESWe design and architect networks to secure and protect the confidentiality, integrity and availability of information that traverses the network and systems infrastructure.
We’ll ensure the scope of the project meets your ICT environment and seamlessly integrates your critical functions to meet the configurations required. Solutions can be applied with varied levels of control to help you find the mix that is right for your environment, risk appetite and security strategy.
We’ll maintain vigilance over your defences around the clock with our 24 x 7 monitoring and response capability. From our Network Operations Centre we monitor your network within response times that meet your requirements.
FROM UPDATING FIREWALLS TO ASSESSING
YOUR ORGANISATIONS VULNERABILITY
Reducing security complexity yesopt.us/reducingcomplexity Updating firewalls
yesopt.us/updatingfirewalls Securing your online presence yesopt.us/onlinepresence
Remote access to corporate networks yesopt.us/accessnetworks
4 steps you should take yesopt.us/4steps
WE OFFER PROFESSIONAL
SERVICES TO GIVE YOU PEACE
OF MIND WHEN ADOPTING A
© 2013 SingTel Optus Pty Limited. OBN0174 1213KD
innovative communications solutions;
contact your Optus Account Manager or call the Optus Business hotline on 1800 555 937
JOIN THE CONVERSATION