SECURITY SOLUTIONS AND SERVICES
OVERVIEW
SECURITY ARCHITECTURE
The Internet brings us closer together. Via Internet, the several of utilities are shared that also means many risks of information security are threatening users.
In the recent years, information security has become a hot topic, especially to organizations applying IT to run the business, information security is more and more important. For enter-prises such as banking, e-commerce… it is even vital since only one information security issue causes loss of enterprises’ finance and reputation. Being aware of the necessity of protecting system security that organizations have gradually considered information security as a priority plan in the overall information technology system.
HPT Vietnam Corporation is an ICT service and solution provider within over 20-year experi-ence, we have understood the challenges in information security and determined to be with customers applying latest technology, providing security services for the purpose of consecutive analyzing, monitoring and warning in case of security risks, then offer timely and efficient resolutions.
HPT implements security solutions and services that based on follow-ing security architecture:
The security solutions we provide for customers are based on an overall and uniform architecture in which their components not only work independently, perform their own separate functionality but also combine together for:
Establishing comprehensively security from perimeter, internal to the end-user.
Exploiting optimally security features against all system components. Enforcing general security policies which simply administer, meet ISO/IEC27001, ISMS, ITIL… requirements.
Offering system self-recovery against forms of attack.
Application security
Data security
Network security
Endpoint security
Centralized security management
Security architecture HPT providesSECURITY SOLUTIONS
Web application firewall-WAF solutionBenefits: prevention from attacking web applications, monitor continuously web application systems and issue alert in case of vulnerabilities inside applications. Features:
Web traffic management Layer 7 protection(OSI model) HTTP/S protocol monitoring
Application and data protection against illegal attacks
Deep analysis of packets from web service machine traffic.
Fraud detection solution
Benefits: prevention from impersonating user, hijacking
and using illegally transaction accounts over e-commerce and e-banking environment.
Features:
Surveillance e-commerce and e-banking user’s behaviors.
Anti-stealing user’s identity based on information: transaction types, transaction payment, time, geographical location (IP address)…
Prevent abusive behaviors within the system: directly accessing to order-pages, using suspect environment variables.
Prevent suspect behaviors from online transaction system: using many times one payment card, paying many times from one IP address.
Application security solutions
Database security monitoring solution
Benefits: centrally protection of database system. Features:
Control operations in database, enforce strict policies.
Prevent abnormal behaviors based on self-study about normal database’s actions.
Detect and prevent attacks to database as a dedicated IPS.
Manage privileged accounts and user’s authoriza-tion on database.
Report database’s operation performance as loads, queries, and the most accessed objects, objects have issues in respond time…
Determine and recommend methods to handle vulnerabilities.
Data encryption
Benefits: protection of sensitive data by encryption formalities: folder/file/partition encryption…
Features:
Perform encryption in endpoint devices (laptop, smartphone, desktop…).
Encrypt local and network partitions at both file and folder level.
Data encryption solution
Benefits: protection of sensitive data by encryption formalities: folder/file/partition encryption…
Features:
Perform encryption in endpoint devices (laptop, smartphone, desktop…).
Encrypt local and network partitions at both file and folder level.
Data security solutions
Unified threat management (UTM) solution
Benefits: gateway protection, prevention from risks in Internet environment.
Features: Web filtering
Intrusion protection system(IPS) Anti-DDoS
Anti-Virus, anti-Spam Service port filtering
Application and user control.
IPS and Anti-DDoS solution
Benefits: dedicated appliance for preventing DDoS attacks.
Features:
Prevent formalities of intrusion
SSL offload.
Prevent DDoS attacks
Vulnerabilities scanner solution
Benefits: Vulnerability identifying, monitoring and resolution over the entire network system, server, operating system, database, application.
Features:
Provide comprehensive reports about vulnerabili-ties in the system.
Alert immediately when security vulnerabilities appear.
Assist administrator in customizing security system policies accurately, appropriately and timely
Integrate with other monitor and protection systems as IDS/IPS, firewall, web application… that constructs a security defense in depth system and tightly associates with security components.
Anti-Spam/Anti-Virus gateway solution
Benefits: dedicated solution for blocking spam emails and preventing viruses.
Features: SSL offload
Spam email filtering
Virus-attached email filtering
Malware associated connection isolation
Transmission encryption and security solution
Benefits: dedicated solutions for protecting several sites in a system, especially for multi-branch enterprises with high demand in transmission security.
Features:
Encryption from layer 2(OSI model); Ethernet, Fiber channel/FICON and SDH/SONET from 20Mbps to 10Gbps supported
Voice encryption
Fax transmission encryption
Malware monitoring and analysis solution
Benefits: identify existing malware in system, integrate with gateway level solutions to prevent malware infect-ing system.
Features:
Detect and prevent APT attacks
Zero-day malware and vulnerability exploitation in documents
Network attacks
Email threats(phishing, spear-phishing): Bots, Trojans, Key loggers and Crime ware
Real-time monitoring, deep analysis based on an intuitive interface
Focused monitoring on high severity threats and valuable components
Provide system security information and resolutions
Event analysis and security alerts solution
Benefits: centralized system log monitoring, analysis and management.
Features:
Collect logs from all system components: network, security device, server, operating system, applica-tion, database…
Automatically aggregate and analysis system logs Timely alerts to administrator in case of system issues
Links events from different log sources
Privileged account management solution
Benefits: monitor, manage privileged accounts in the system
Features:
All administrative accounts, privileged accounts are
stored and encrypted in protected server.
Monitor, control executive behaviors in the system when using privileged accounts to log on
Limit commands to execute for each account Allocate account in a strict process
System security policy management solution
Benefits: establish, manage and monitor security policies over the entire system.
Features:
Establish process, policy for risk management, issue management, change management, incident management…
Integrate with SIEM, VA,… for supporting adminis-trator to implement appropriate security policy Assess security policies against security standards to determine compliance status
Centralized security management solutions
Access control solutionBenefits: ensure compliance in system regulations and policies.
Features:
Ensure endpoints to comply policies before access-ing system resources: update latest patch, install antivirus software…
Integrate with components to isolate non-compliance computers, automatically modify and enforce policies to non-compliant computers
Endpoint security solution
Benefits: prevent security threats which are able to harm endpoints.
Features:
Data leak prevention
Anti-Virus/Spyware/… Web filtering
Hosted-IPS Data encryption Application control
One-time password (OTP) solution
Benefits: enhanced user access protection. Features:
Randomly generate password by time (30s, 60s…) Integrate to IT infrastructure for accessing servers, network devices, databases, applications…
Forms of OPT supported as email, SMS, hardware token, software token…
CUSTOMERS
Domestic and foreign companies and corporations have demand on enhancing information security to guarantee business operation Enterprises compliance audit standards and information security certificates as ISO 27001, PCI DSS…
Enterprises expect to manage information security in a tightly process that brings them specific benefits
Enterprises are in system standardization and attention in information security.
SECURITY SERVICES
This service is performed via testing system’s security vulnerabilities, testing self-defense ability against attacks from external to internal, from internal users or enterprise’s partners.
Black-box testing: assume that the hacker knows noth-ing about enterprise’s information and carries out attacking system’s components.
White-box testing: assume that hacker knows all system information such as topology, existing applications and operating systems.
Gray-box testing: assume that the hacker is granted a general user account and performs an attack to system like an enterprise’s employee
Besides the above various sets of security solutions, HPT offers the security service with the following content:
Penetration testing
This service is performed via testing overall system, includ-ing security policies, network device configuration, applica-tions, physical safety,…according to ISO 27001 standard, moreover provide appropriate security recommendations for enterprise system.
Service comprises of surveys and assesses for following information:
Network topology
Basic network devices (Router, switch…)
Devices, network security software (Firewall, IPS/ÍDS, VPN…)
Security policies Server system
Backup and restore system
Source-code auditing
Total security consultant
HPT performs survey in the overall system, analyses security risks and threats in specific detail, and then consults total security, suitable security investment process as well for customer’s system.
On-demand security consultant
Depend on particular customer’s demand(e.g. endpoint security, application security or gateway protection,…) HPT surveys and analyses specifically relevant components, then consults detailed security solutions/services need deploying for the purpose of meeting customer demand.
SOLUTION AND SERVICE BENEFITS
With superiority as the leading company in information technology domain, HPT helps customers to assess and construct an information security system effectively with the most reasonable expense and time.
Early detect threats and risks which customer’s system are facing and recommend effect and timely solutions
Enhance system security based on solutions consulted by HPT.
Optimize and standardize system as international standards
Increase self-defense ability when system faces threats.
Improve the competitive capability of enterprise, improve as well confidence from customers and partners for enterprise
HPT COMPETENCY
HPT expert team are experienced in carrying out services and deploying security solution throughout Vietnam and abroad. Besides technique skills, HPT team also have the advanced certificates in informa-tion security as CISSP, CCIE Security, CEH, Security+, CCSE ...
HPT deployed advanced security solutions for customers: Vietinbank,
Techcombank, Saigontech, TimeSquare, General Department of
Tax, General Department of Customs…
The advanced security solutions and services are performed by security experts along with experience and tight implement process that ensure quality, security and time on
customer’s demand. Report for POC
Establish POC Plan Execute plan Log tasks Project Report Stop Process Detect/exploit system vulnerability Sign NDA Establish criteria for evaluating Yes No Responses Receive Information Set objectives START END Hanoi Branch
123 Xa Dan St, Dong Da Dist, Hanoi,
Tel: +(84 4) 35 738 088 • Fax: +(84 4) 35 738 089 Danang Branch
12th Floor, Danang Software Park, 02 Quang Trung St, Danang City,
Tel: +(84 511) 73 050 60 • Fax: +(84 511) 38 903 88 Representative Office In Cambodia
3rd floor # 128J, Russian Federation Blvd (110), Sangkat Toek Laak 1, Khan Toul Kork, Phnom Penh, Cambodia
Head Office
9th Floor, Paragon Building, 03 Nguyen Luong Bang St, Dist 7, HCMC,
Tel:+(84 8) 54 123 400 • Fax: +(84 8) 54 108 801
www.hpt.vn
HPT Customer Service Center
47 Nguyen Truong To St, Ward 12, Dist 4, HCMC,
Tel:+(84 8) 38 266 206 • Fax: +(84 8) 38 266 044