NTT Com Enhances Managed Services for Global Security Outsourcing
OREANDA-NEWS. September 28, 2012. NTT Communications Corporation (NTT Com) announced today that its Managed Security Services for total outsourcing of security risk management solutions has begun offering Network Profiling, File Verification and Data Loss Prevention for strengthened security against cyber attacks targeting enterprises.
The services help to protect ICT environments and minimize the risk of information leakage by detecting unknown threats and malware, such as targeted attacks. In combination with other Managed Security Services from NTT Com, the new offerings provide security log correlation analyses and help to determine potential risks, thereby enabling customers to anticipate possible needs for more robust security measures.
The Managed Security Services are as follow:
Network Profiling: This service provides security monitoring via security equipment installed in the customer’s network to detect unauthorized access and viruses. Specialists at NTT Com analyze network traffic for unknown threats and potential risks that cannot be found by conventional IDS/IPS signatures or antivirus pattern files. They also visualize threats and risks, determine the degree of risk and provide report on the security measures tailored to each customer. As a result, customers can identify security risks sooner and take appropriate measures.
File Verification: This service provides security monitoring via security equipment installed in the customer’s network to analyze email attachments and downloaded files. Files are tested in pseudo environments for unknown malware not identifiable through standard antivirus measures. The service provides protection against new security threats, such as targeted attacks using email attachment containing unknown malware.
DLP: This service uses DLP equipment installed in the customer’s network to detect and report confidential files sent in violation of the customer’s security policies prohibiting data from leaving the network. The service also provides tracking if it identifies an information leakage or detects signs of a possible leakage. As a result, customers can determine needs for implementing stricter controls via systematic rules for handling confidential information. The service also enables customers to assess the extent of damage from leakage and identify needs for stronger security measures.
Комментарии