SECURITY SOLUTIONS AND SERVICES

Loading....

Loading....

Loading....

Loading....

Loading....

Full text

(1)

SECURITY SOLUTIONS AND SERVICES

OVERVIEW

SECURITY ARCHITECTURE

The Internet brings us closer together. Via Internet, the several of utilities are shared that also means many risks of information security are threatening users.

In the recent years, information security has become a hot topic, especially to organizations applying IT to run the business, information security is more and more important. For enter-prises such as banking, e-commerce… it is even vital since only one information security issue causes loss of enterprises’ finance and reputation. Being aware of the necessity of protecting system security that organizations have gradually considered information security as a priority plan in the overall information technology system.

HPT Vietnam Corporation is an ICT service and solution provider within over 20-year experi-ence, we have understood the challenges in information security and determined to be with customers applying latest technology, providing security services for the purpose of consecutive analyzing, monitoring and warning in case of security risks, then offer timely and efficient resolutions.

HPT implements security solutions and services that based on follow-ing security architecture:

The security solutions we provide for customers are based on an overall and uniform architecture in which their components not only work independently, perform their own separate functionality but also combine together for:

Establishing comprehensively security from perimeter, internal to the end-user.

Exploiting optimally security features against all system components. Enforcing general security policies which simply administer, meet ISO/IEC27001, ISMS, ITIL… requirements.

Offering system self-recovery against forms of attack.

Application security

Data security

Network security

Endpoint security

Centralized security management

Security architecture HPT provides

(2)

SECURITY SOLUTIONS

Web application firewall-WAF solution

Benefits: prevention from attacking web applications, monitor continuously web application systems and issue alert in case of vulnerabilities inside applications. Features:

Web traffic management Layer 7 protection(OSI model) HTTP/S protocol monitoring

Application and data protection against illegal attacks

Deep analysis of packets from web service machine traffic.

Fraud detection solution

Benefits: prevention from impersonating user, hijacking

and using illegally transaction accounts over e-commerce and e-banking environment.

Features:

Surveillance e-commerce and e-banking user’s behaviors.

Anti-stealing user’s identity based on information: transaction types, transaction payment, time, geographical location (IP address)…

Prevent abusive behaviors within the system: directly accessing to order-pages, using suspect environment variables.

Prevent suspect behaviors from online transaction system: using many times one payment card, paying many times from one IP address.

Application security solutions

Database security monitoring solution

Benefits: centrally protection of database system. Features:

Control operations in database, enforce strict policies.

Prevent abnormal behaviors based on self-study about normal database’s actions.

Detect and prevent attacks to database as a dedicated IPS.

Manage privileged accounts and user’s authoriza-tion on database.

Report database’s operation performance as loads, queries, and the most accessed objects, objects have issues in respond time…

Determine and recommend methods to handle vulnerabilities.

Data encryption

Benefits: protection of sensitive data by encryption formalities: folder/file/partition encryption…

Features:

Perform encryption in endpoint devices (laptop, smartphone, desktop…).

Encrypt local and network partitions at both file and folder level.

Data encryption solution

Benefits: protection of sensitive data by encryption formalities: folder/file/partition encryption…

Features:

Perform encryption in endpoint devices (laptop, smartphone, desktop…).

Encrypt local and network partitions at both file and folder level.

Data security solutions

Unified threat management (UTM) solution

Benefits: gateway protection, prevention from risks in Internet environment.

Features: Web filtering

Intrusion protection system(IPS) Anti-DDoS

Anti-Virus, anti-Spam Service port filtering

Application and user control.

IPS and Anti-DDoS solution

Benefits: dedicated appliance for preventing DDoS attacks.

Features:

Prevent formalities of intrusion

SSL offload.

Prevent DDoS attacks

Vulnerabilities scanner solution

Benefits: Vulnerability identifying, monitoring and resolution over the entire network system, server, operating system, database, application.

Features:

Provide comprehensive reports about vulnerabili-ties in the system.

Alert immediately when security vulnerabilities appear.

Assist administrator in customizing security system policies accurately, appropriately and timely

Integrate with other monitor and protection systems as IDS/IPS, firewall, web application… that constructs a security defense in depth system and tightly associates with security components.

(3)

Anti-Spam/Anti-Virus gateway solution

Benefits: dedicated solution for blocking spam emails and preventing viruses.

Features: SSL offload

Spam email filtering

Virus-attached email filtering

Malware associated connection isolation

Transmission encryption and security solution

Benefits: dedicated solutions for protecting several sites in a system, especially for multi-branch enterprises with high demand in transmission security.

Features:

Encryption from layer 2(OSI model); Ethernet, Fiber channel/FICON and SDH/SONET from 20Mbps to 10Gbps supported

Voice encryption

Fax transmission encryption

Malware monitoring and analysis solution

Benefits: identify existing malware in system, integrate with gateway level solutions to prevent malware infect-ing system.

Features:

Detect and prevent APT attacks

Zero-day malware and vulnerability exploitation in documents

Network attacks

Email threats(phishing, spear-phishing): Bots, Trojans, Key loggers and Crime ware

Real-time monitoring, deep analysis based on an intuitive interface

Focused monitoring on high severity threats and valuable components

Provide system security information and resolutions

Event analysis and security alerts solution

Benefits: centralized system log monitoring, analysis and management.

Features:

Collect logs from all system components: network, security device, server, operating system, applica-tion, database…

Automatically aggregate and analysis system logs Timely alerts to administrator in case of system issues

Links events from different log sources

Privileged account management solution

Benefits: monitor, manage privileged accounts in the system

Features:

All administrative accounts, privileged accounts are

stored and encrypted in protected server.

Monitor, control executive behaviors in the system when using privileged accounts to log on

Limit commands to execute for each account Allocate account in a strict process

System security policy management solution

Benefits: establish, manage and monitor security policies over the entire system.

Features:

Establish process, policy for risk management, issue management, change management, incident management…

Integrate with SIEM, VA,… for supporting adminis-trator to implement appropriate security policy Assess security policies against security standards to determine compliance status

Centralized security management solutions

Access control solution

Benefits: ensure compliance in system regulations and policies.

Features:

Ensure endpoints to comply policies before access-ing system resources: update latest patch, install antivirus software…

Integrate with components to isolate non-compliance computers, automatically modify and enforce policies to non-compliant computers

Endpoint security solution

Benefits: prevent security threats which are able to harm endpoints.

Features:

Data leak prevention

Anti-Virus/Spyware/… Web filtering

Hosted-IPS Data encryption Application control

One-time password (OTP) solution

Benefits: enhanced user access protection. Features:

Randomly generate password by time (30s, 60s…) Integrate to IT infrastructure for accessing servers, network devices, databases, applications…

Forms of OPT supported as email, SMS, hardware token, software token…

(4)

CUSTOMERS

Domestic and foreign companies and corporations have demand on enhancing information security to guarantee business operation Enterprises compliance audit standards and information security certificates as ISO 27001, PCI DSS…

Enterprises expect to manage information security in a tightly process that brings them specific benefits

Enterprises are in system standardization and attention in information security.

SECURITY SERVICES

This service is performed via testing system’s security vulnerabilities, testing self-defense ability against attacks from external to internal, from internal users or enterprise’s partners.

Black-box testing: assume that the hacker knows noth-ing about enterprise’s information and carries out attacking system’s components.

White-box testing: assume that hacker knows all system information such as topology, existing applications and operating systems.

Gray-box testing: assume that the hacker is granted a general user account and performs an attack to system like an enterprise’s employee

Besides the above various sets of security solutions, HPT offers the security service with the following content:

Penetration testing

This service is performed via testing overall system, includ-ing security policies, network device configuration, applica-tions, physical safety,…according to ISO 27001 standard, moreover provide appropriate security recommendations for enterprise system.

Service comprises of surveys and assesses for following information:

Network topology

Basic network devices (Router, switch…)

Devices, network security software (Firewall, IPS/ÍDS, VPN…)

Security policies Server system

Backup and restore system

Source-code auditing

Total security consultant

HPT performs survey in the overall system, analyses security risks and threats in specific detail, and then consults total security, suitable security investment process as well for customer’s system.

On-demand security consultant

Depend on particular customer’s demand(e.g. endpoint security, application security or gateway protection,…) HPT surveys and analyses specifically relevant components, then consults detailed security solutions/services need deploying for the purpose of meeting customer demand.

(5)

SOLUTION AND SERVICE BENEFITS

With superiority as the leading company in information technology domain, HPT helps customers to assess and construct an information security system effectively with the most reasonable expense and time.

Early detect threats and risks which customer’s system are facing and recommend effect and timely solutions

Enhance system security based on solutions consulted by HPT.

Optimize and standardize system as international standards

Increase self-defense ability when system faces threats.

Improve the competitive capability of enterprise, improve as well confidence from customers and partners for enterprise

HPT COMPETENCY

HPT expert team are experienced in carrying out services and deploying security solution throughout Vietnam and abroad. Besides technique skills, HPT team also have the advanced certificates in informa-tion security as CISSP, CCIE Security, CEH, Security+, CCSE ...

HPT deployed advanced security solutions for customers: Vietinbank,

Techcombank, Saigontech, TimeSquare, General Department of

Tax, General Department of Customs…

The advanced security solutions and services are performed by security experts along with experience and tight implement process that ensure quality, security and time on

customer’s demand. Report for POC

Establish POC Plan Execute plan Log tasks Project Report Stop Process Detect/exploit system vulnerability Sign NDA Establish criteria for evaluating Yes No Responses Receive Information Set objectives START END Hanoi Branch

123 Xa Dan St, Dong Da Dist, Hanoi,

Tel: +(84 4) 35 738 088 • Fax: +(84 4) 35 738 089 Danang Branch

12th Floor, Danang Software Park, 02 Quang Trung St, Danang City,

Tel: +(84 511) 73 050 60 • Fax: +(84 511) 38 903 88 Representative Office In Cambodia

3rd floor # 128J, Russian Federation Blvd (110), Sangkat Toek Laak 1, Khan Toul Kork, Phnom Penh, Cambodia

Head Office

9th Floor, Paragon Building, 03 Nguyen Luong Bang St, Dist 7, HCMC,

Tel:+(84 8) 54 123 400 • Fax: +(84 8) 54 108 801

www.hpt.vn

HPT Customer Service Center

47 Nguyen Truong To St, Ward 12, Dist 4, HCMC,

Tel:+(84 8) 38 266 206 • Fax: +(84 8) 38 266 044

Figure

Updating...

References

Updating...