Upgrade to Pro — share decks privately, control downloads, hide ads and more …

NETMONASTERY PROFILE

shomiron
September 13, 2012

NETMONASTERY PROFILE

NetMonastery NSPL is a value based security service provider. It specializes in real-time attack detection and threat monitoring services.

shomiron

September 13, 2012
Tweet

More Decks by shomiron

Other Decks in Business

Transcript

  1. Executive Summary With company data available on the network security

    is an increasingly important area for most if not all organizations Space Definition Online threats are increasing, and companies are investing heavily to ensure that they have comprehensive protection The Situation NetMonastery provides an online, real-time, cloud-based solution to detect and escalates threats in real-time Here We Are ! After having several of India’s largest companies, as clients NetMonastery plans to rapidly grow its technology lineup Current State NetMonastery is a company providing online, real-time, network security threat detection since 2009
  2. NetMonastery ! An agile and courageous group of people who

    innovate everywhere, and also specialize in computer security. Who Detecting attackers and their latest tricks in Real-time. Further, providing only the actionable to a customer. Business Secured the CWG website the most attacked Indian website, similarly protecting the largest organizations across verticals. Highlights Deliver effective security solutions that define the future and demonstrate the courage to be the change. Vision
  3. Problem One organization has multiple security devices managed by different

    groups with no sync or accountability. Accountability Attack detection requires experience and constant research. Organizations are still struggling with their FMS. Capability Being available and awake is the first step, but delivering the correct attack analysis at 3 am is the challenge. Preparedness Q: How secure are you ? A: This year we spent 2Mill on security and testing. There is no measuring yardstick. Measurability What we can’t measure, we can’t improve.
  4. Current Standards The old war horse, the central pillar of

    most infrastructures. Most attacks cross firewalls as legit traffic and then blow up. Firewalls Effective but plagued with false alarms, require an expert resource to extract the real juice. Intrusion Prevention System Cost is the first entry barrier, an expert team is the second. You can buy a jumbo but you will still need a pilot to fly it ! SIEM Put all of the above in a box and delivered as a service. Have been reduced to managers of the above, no value add… Managed Security Providers Timely, Accurate, Actionable and Affordable are the keys that are missing
  5. Intro CNAM CNAM is an efficient and quickly deployable solution

    for guarding your IT system and offers round-the-clock monitoring and real-time detection of harmful intrusions, that threaten your information security and hence - your business.
  6. Value Proposition Participates in every aspect of security in the

    infrastructure and controls the critical components itself. Coverage Pay-as-you-Go, enables the smallest and accelerates the largest. In failure throw us out without losing money or sleep Scale with SaaS Our process jives with our research and we are bold enough to talk about it. Yes we take penalties. Assurance We provide attackers as actionable items, we worry about being accurate and while you watch our KRA’s. Deliverables We sell you the juice and not the juicer !
  7. Architecture Dedicated detection and correlation engines for each customer All

    transactional log data and threat information remain within the enterprise network UNET the central intelligence processing unit is responsible for real-time intelligence exchange between customers Application integration for premium customers shortens the detection span for attacks  
  8. Use Cases Largest scale, with multiple distributed zones across the

    globe can now be managed from a single analysis console. Enterprise Download an image from the web, setup your systems, sign up – pay and be security delivered. Small Enterprise Signup with a cloud provider, initiate an instance and watch what’s flying around. It’s all integrated and connected. Micro Enterprise Opportunity to deliver a valued service to existing customers. It’s also additional billing on the existing team. Security Providers One that fits your size, and grows with you… including payments
  9. Key Factors With the market shifting rapidly to cloud services,

    security and monitoring on the cloud has become top priority Cloud Security The wide acceptance of SaaS has re-energized the industry and we are now poised to roll out Security-as-a-Service Software-as-a-Service The increasing demand for greater visibility of the threat landscape has doubled the need for real solutions Enterprise Demand Cloud players looking to put together a bouquet of services that can be plug and play and can bring additional revenue Leverage
  10. Competitive Advantage Real-time attack detection as a service has been

    offered for the first time, and therefore NM has the first movers advantage New Market Investments in detection technologies and integration techniques forms a time consuming entry barrier Technology It’s a challenge to cover all the bases in security, and NM has successfully run operations for years doing just that Comprehensiveness More customers, more the intelligence and increased accuracy, existing customers help attract others Collaborative Advantage Only CNAM can provide a wide base of real-time event threads
  11. -­‐   -­‐   -­‐   Product Lineup COMPREHENSIVE NETWORK

    ATTACK MONITORING Managed Intrusion Detection Managed Threat Correlation UNET Intelligence Web Analysis Console (CARD) Device Log Integration Application Security Integration Target Customers Enterprise Small Enterprise Micro Enterprise NM Involvement Strategic Nil Nil Deployment Manual Automated Automated Support by (partners / self) Both Partners Partners
  12. Revenue Model Customers are billed only for the amount of

    data that is sanitized by CNAM e.g. the usage of their Internet link Simple Licensing Customers can start easy without any capital investment, and the option of an easy disengagement Pay-per-Use Customers who opt for the premium service have an additional variable added to the billing depending upon the number of applications integrated into CNAM Premium Service Assisting customers in recovering from attacks in the shortest possible time and being able to deliver accurate analysis with evidence on the source of attack Incident Handling
  13. Pricing Customers are comfortable with the usage metrics of bandwidth,

    the same metrics are used to license CNAM Bandwidth Billing Easy for partners to estimate usage of the customer, everyone knows their bandwidth usage Estimation Benefits Number of devices and their corresponding events per second is directly proportionate to the bandwidth used Relativity The pricing model does not require the customer to choose a usage bracket, discounts are automatically applied on usage Sequential Scale