is an increasingly important area for most if not all organizations Space Definition Online threats are increasing, and companies are investing heavily to ensure that they have comprehensive protection The Situation NetMonastery provides an online, real-time, cloud-based solution to detect and escalates threats in real-time Here We Are ! After having several of India’s largest companies, as clients NetMonastery plans to rapidly grow its technology lineup Current State NetMonastery is a company providing online, real-time, network security threat detection since 2009
innovate everywhere, and also specialize in computer security. Who Detecting attackers and their latest tricks in Real-time. Further, providing only the actionable to a customer. Business Secured the CWG website the most attacked Indian website, similarly protecting the largest organizations across verticals. Highlights Deliver effective security solutions that define the future and demonstrate the courage to be the change. Vision
groups with no sync or accountability. Accountability Attack detection requires experience and constant research. Organizations are still struggling with their FMS. Capability Being available and awake is the first step, but delivering the correct attack analysis at 3 am is the challenge. Preparedness Q: How secure are you ? A: This year we spent 2Mill on security and testing. There is no measuring yardstick. Measurability What we can’t measure, we can’t improve.
most infrastructures. Most attacks cross firewalls as legit traffic and then blow up. Firewalls Effective but plagued with false alarms, require an expert resource to extract the real juice. Intrusion Prevention System Cost is the first entry barrier, an expert team is the second. You can buy a jumbo but you will still need a pilot to fly it ! SIEM Put all of the above in a box and delivered as a service. Have been reduced to managers of the above, no value add… Managed Security Providers Timely, Accurate, Actionable and Affordable are the keys that are missing
for guarding your IT system and offers round-the-clock monitoring and real-time detection of harmful intrusions, that threaten your information security and hence - your business.
infrastructure and controls the critical components itself. Coverage Pay-as-you-Go, enables the smallest and accelerates the largest. In failure throw us out without losing money or sleep Scale with SaaS Our process jives with our research and we are bold enough to talk about it. Yes we take penalties. Assurance We provide attackers as actionable items, we worry about being accurate and while you watch our KRA’s. Deliverables We sell you the juice and not the juicer !
transactional log data and threat information remain within the enterprise network UNET the central intelligence processing unit is responsible for real-time intelligence exchange between customers Application integration for premium customers shortens the detection span for attacks
globe can now be managed from a single analysis console. Enterprise Download an image from the web, setup your systems, sign up – pay and be security delivered. Small Enterprise Signup with a cloud provider, initiate an instance and watch what’s flying around. It’s all integrated and connected. Micro Enterprise Opportunity to deliver a valued service to existing customers. It’s also additional billing on the existing team. Security Providers One that fits your size, and grows with you… including payments
security and monitoring on the cloud has become top priority Cloud Security The wide acceptance of SaaS has re-energized the industry and we are now poised to roll out Security-as-a-Service Software-as-a-Service The increasing demand for greater visibility of the threat landscape has doubled the need for real solutions Enterprise Demand Cloud players looking to put together a bouquet of services that can be plug and play and can bring additional revenue Leverage
offered for the first time, and therefore NM has the first movers advantage New Market Investments in detection technologies and integration techniques forms a time consuming entry barrier Technology It’s a challenge to cover all the bases in security, and NM has successfully run operations for years doing just that Comprehensiveness More customers, more the intelligence and increased accuracy, existing customers help attract others Collaborative Advantage Only CNAM can provide a wide base of real-time event threads
data that is sanitized by CNAM e.g. the usage of their Internet link Simple Licensing Customers can start easy without any capital investment, and the option of an easy disengagement Pay-per-Use Customers who opt for the premium service have an additional variable added to the billing depending upon the number of applications integrated into CNAM Premium Service Assisting customers in recovering from attacks in the shortest possible time and being able to deliver accurate analysis with evidence on the source of attack Incident Handling
the same metrics are used to license CNAM Bandwidth Billing Easy for partners to estimate usage of the customer, everyone knows their bandwidth usage Estimation Benefits Number of devices and their corresponding events per second is directly proportionate to the bandwidth used Relativity The pricing model does not require the customer to choose a usage bracket, discounts are automatically applied on usage Sequential Scale