|By Business Wire||
|June 24, 2014 01:30 PM EDT||
CSC (NYSE: CSC) today announced the expansion of the company’s Cloud Cybersecurity Services portfolio with three enhanced offerings for clients that help protect CSC cloud solutions from the constantly evolving and escalating threat landscape.
As enterprise and public sector customers turn to next-generation cloud infrastructure-based services to maximize business and economic advantage, the need for effective security controls, regulatory compliance and risk mitigation have become increasingly important. Recent research by McKinsey and the World Economic Forum (The rising strategic risks of cyberattacks) found that companies are struggling with their capabilities in cyber risk management, with more than half of all respondents believing that cybersecurity is a strategic risk for their companies.
CSC Cloud Cybersecurity Services enable organizations to enhance the security of their cloud solutions from CSC. The suite of services and capabilities have been designed, built and integrated to meet the demands of a dynamic cloud business model, and provide a flexible, usage-based model that is integrated and aligned with CSC’s Managed Cybersecurity strategy. This allows both CSC self-service and managed cloud customers the flexibility and efficiency to apply more advanced levels of security functionality as the regulatory, compliance and security risk of the organization demands. CSC's enhanced Managed Cloud Cybersecurity Service integrated solutions are:
- Cloud Endpoint Protection (CEP) – Offers 7x24x365 monitoring and alerting for CSC cloud- based host protection. CEP is scalable and can be easily deployed into a cloud environment and infrastructure with the ability to dynamically add additional servers and hosts at any time. Innovative and industry-leading agentless Anti-Malware from Trend Micro Deep SecurityTM is included as baseline functionality, with agentless or host based Intrusion Protection and File Integrity Monitoring also available to help satisfy regulatory demands.
- Cloud Managed Vulnerability Assessments (CVMA) – Provides centrally managed vulnerability scanning and configuration compliance monitoring for servers, Virtual Machines (VM’s) and cloud infrastructure. Vulnerability scanning is offered as a baseline functionality server configuration and compliance monitoring is also available as regulatory demands require. CSC leverages Tripwire® IP360™, to comprehensively profile designated network devices and include up-to-date coverage of the latest operating systems, applications, and vulnerabilities on the network. Tripwire IP360’s agentless architecture is designed for rapid deployment and ease of management across large, globally-distributed networks.
- Cloud Security Incident and Event Monitoring (CSIEM) – Comprises log collection, log storage, event correlation and security incident alerting and reporting on CSC cloud servers and VM's, supported by 7x24x365 SOC monitoring and alerting. In addition, CSC Cybersecurity's integrated Global Threat Intelligence (GTI) feeds the SIEM, to provide advance warnings of potential security threats and exploits impacting the cloud environment. CSC leverages HP Arcsight as the market leading SIEM platform for global SOC integration, to help customers overcome the evolving threat landscape with continuous real-time event monitoring across the cloud environment.
“Customers considering the adoption of public and private cloud solutions want to strengthen the protection of CSC cloud infrastructure offerings from the rapidly changing threat landscape,” said Samuel Visner, CSC’s vice president and general manager for Cybersecurity. “Our growing suite of Cloud Cybersecurity Services now offers both self-service and CSC cloud management customers a resilient framework of cloud security controls specifically built for the Virtual Computing Environment (VCE) coalition, available as OPEX services. This provides elasticity to support the dynamic business requirements that customers require on their premises or in the CSC data center environment.”
The CSC Cloud Cybersecurity Services portfolio offers As-a-Service solutions from the most efficient enterprise cloud security vendors to ease migration and transformation capabilities, which are uniquely designed for the cloud in a secure, reliable, transparent manner. The growing suite of services helps customers support and demonstrate regulatory compliance mandates (ISO27001, FISMA, NIST, HIPAA, PCI) against specific regulatory security controls. In addition, the Cloud Cybersecurity Services are managed and monitored from CSC's global Cybersecurity Operations Centers providing reach and scale where required. CSC’s layered architecture helps protect clients against malicious threats using industry recognized leading software, which is available in an agentless deployment and delivers more efficient resource utilization and higher VM densities than traditional agent-based solutions.
CSC is a global leader of next-generation information technology (IT) services and solutions. The company's mission is to enable superior returns on clients’ technology investments through best-in-class industry solutions, domain expertise and global scale. CSC has approximately 79,000 employees and reported revenue of $13.0 billion for the 12 months ended March 28, 2014. For more information, visit the company's website at www.csc.com.
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
May. 4, 2016 03:30 AM EDT Reads: 1,131
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
May. 4, 2016 03:00 AM EDT Reads: 777
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 18th Cloud Expo, Dave Nielsen, Developer Relations at Redis Labs, will shares the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
May. 4, 2016 12:45 AM EDT Reads: 1,180
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, will show how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningfu...
May. 3, 2016 11:45 PM EDT Reads: 1,010
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...
May. 3, 2016 11:30 PM EDT Reads: 1,237
Artificial Intelligence has the potential to massively disrupt IoT. In his session at 18th Cloud Expo, AJ Abdallat, CEO of Beyond AI, will discuss what the five main drivers are in Artificial Intelligence that could shape the future of the Internet of Things. AJ Abdallat is CEO of Beyond AI. He has over 20 years of management experience in the fields of artificial intelligence, sensors, instruments, devices and software for telecommunications, life sciences, environmental monitoring, process...
May. 3, 2016 11:00 PM EDT Reads: 1,210
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, will discuss how leveraging the Industrial Interne...
May. 3, 2016 11:00 PM EDT Reads: 1,293
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
May. 3, 2016 10:00 PM EDT Reads: 1,324
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
May. 3, 2016 10:00 PM EDT Reads: 1,212
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
May. 3, 2016 09:45 PM EDT Reads: 346
SYS-CON Events announced today that Ericsson has been named “Gold Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. Ericsson is a world leader in the rapidly changing environment of communications technology – providing equipment, software and services to enable transformation through mobility. Some 40 percent of global mobile traffic runs through networks we have supplied. More than 1 billion subscribers around the world re...
May. 3, 2016 08:45 PM EDT Reads: 1,284
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists will dis...
May. 3, 2016 08:45 PM EDT Reads: 972
We’ve worked with dozens of early adopters across numerous industries and will debunk common misperceptions, which starts with understanding that many of the connected products we’ll use over the next 5 years are already products, they’re just not yet connected. With an IoT product, time-in-market provides much more essential feedback than ever before. Innovation comes from what you do with the data that the connected product provides in order to enhance the customer experience and optimize busi...
May. 3, 2016 08:30 PM EDT Reads: 1,211
The increasing popularity of the Internet of Things necessitates that our physical and cognitive relationship with wearable technology will change rapidly in the near future. This advent means logging has become a thing of the past. Before, it was on us to track our own data, but now that data is automatically available. What does this mean for mHealth and the "connected" body? In her session at @ThingsExpo, Lisa Calkins, CEO and co-founder of Amadeus Consulting, will discuss the impact of wea...
May. 3, 2016 08:00 PM EDT Reads: 1,057