Welcome!

News Feed Item

CSC Expands Suite of Cloud-Based Cybersecurity Offerings

CSC (NYSE: CSC) today announced the expansion of the company’s Cloud Cybersecurity Services portfolio with three enhanced offerings for clients that help protect CSC cloud solutions from the constantly evolving and escalating threat landscape.

As enterprise and public sector customers turn to next-generation cloud infrastructure-based services to maximize business and economic advantage, the need for effective security controls, regulatory compliance and risk mitigation have become increasingly important. Recent research by McKinsey and the World Economic Forum (The rising strategic risks of cyberattacks) found that companies are struggling with their capabilities in cyber risk management, with more than half of all respondents believing that cybersecurity is a strategic risk for their companies.

CSC Cloud Cybersecurity Services enable organizations to enhance the security of their cloud solutions from CSC. The suite of services and capabilities have been designed, built and integrated to meet the demands of a dynamic cloud business model, and provide a flexible, usage-based model that is integrated and aligned with CSC’s Managed Cybersecurity strategy. This allows both CSC self-service and managed cloud customers the flexibility and efficiency to apply more advanced levels of security functionality as the regulatory, compliance and security risk of the organization demands. CSC's enhanced Managed Cloud Cybersecurity Service integrated solutions are:

  • Cloud Endpoint Protection (CEP) – Offers 7x24x365 monitoring and alerting for CSC cloud- based host protection. CEP is scalable and can be easily deployed into a cloud environment and infrastructure with the ability to dynamically add additional servers and hosts at any time. Innovative and industry-leading agentless Anti-Malware from Trend Micro Deep SecurityTM is included as baseline functionality, with agentless or host based Intrusion Protection and File Integrity Monitoring also available to help satisfy regulatory demands.
  • Cloud Managed Vulnerability Assessments (CVMA) – Provides centrally managed vulnerability scanning and configuration compliance monitoring for servers, Virtual Machines (VM’s) and cloud infrastructure. Vulnerability scanning is offered as a baseline functionality server configuration and compliance monitoring is also available as regulatory demands require. CSC leverages Tripwire® IP360™, to comprehensively profile designated network devices and include up-to-date coverage of the latest operating systems, applications, and vulnerabilities on the network. Tripwire IP360’s agentless architecture is designed for rapid deployment and ease of management across large, globally-distributed networks.
  • Cloud Security Incident and Event Monitoring (CSIEM) – Comprises log collection, log storage, event correlation and security incident alerting and reporting on CSC cloud servers and VM's, supported by 7x24x365 SOC monitoring and alerting. In addition, CSC Cybersecurity's integrated Global Threat Intelligence (GTI) feeds the SIEM, to provide advance warnings of potential security threats and exploits impacting the cloud environment. CSC leverages HP Arcsight as the market leading SIEM platform for global SOC integration, to help customers overcome the evolving threat landscape with continuous real-time event monitoring across the cloud environment.

“Customers considering the adoption of public and private cloud solutions want to strengthen the protection of CSC cloud infrastructure offerings from the rapidly changing threat landscape,” said Samuel Visner, CSC’s vice president and general manager for Cybersecurity. “Our growing suite of Cloud Cybersecurity Services now offers both self-service and CSC cloud management customers a resilient framework of cloud security controls specifically built for the Virtual Computing Environment (VCE) coalition, available as OPEX services. This provides elasticity to support the dynamic business requirements that customers require on their premises or in the CSC data center environment.”

The CSC Cloud Cybersecurity Services portfolio offers As-a-Service solutions from the most efficient enterprise cloud security vendors to ease migration and transformation capabilities, which are uniquely designed for the cloud in a secure, reliable, transparent manner. The growing suite of services helps customers support and demonstrate regulatory compliance mandates (ISO27001, FISMA, NIST, HIPAA, PCI) against specific regulatory security controls. In addition, the Cloud Cybersecurity Services are managed and monitored from CSC's global Cybersecurity Operations Centers providing reach and scale where required. CSC’s layered architecture helps protect clients against malicious threats using industry recognized leading software, which is available in an agentless deployment and delivers more efficient resource utilization and higher VM densities than traditional agent-based solutions.

About CSC

CSC is a global leader of next-generation information technology (IT) services and solutions. The company's mission is to enable superior returns on clients’ technology investments through best-in-class industry solutions, domain expertise and global scale. CSC has approximately 79,000 employees and reported revenue of $13.0 billion for the 12 months ended March 28, 2014. For more information, visit the company's website at www.csc.com.

Click here to subscribe to Mobile Alerts for CSC.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, inside...
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next...
Evan Kirstel is an internationally recognized thought leader and social media influencer in IoT (#1 in 2017), Cloud, Data Security (2016), Health Tech (#9 in 2017), Digital Health (#6 in 2016), B2B Marketing (#5 in 2015), AI, Smart Home, Digital (2017), IIoT (#1 in 2017) and Telecom/Wireless/5G. His connections are a "Who's Who" in these technologies, He is in the top 10 most mentioned/re-tweeted by CMOs and CIOs (2016) and have been recently named 5th most influential B2B marketeer in the US. H...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
"We do one of the best file systems in the world. We learned how to deal with Big Data many years ago and we implemented this knowledge into our software," explained Jakub Ratajczak, Business Development Manager at MooseFS, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Today, we have more data to manage than ever. We also have better algorithms that help us access our data faster. Cloud is the driving force behind many of the data warehouse advancements we have enjoyed in recent years. But what are the best practices for storing data in the cloud for machine learning and data science applications?
All zSystem customers have a significant new business opportunity to extend their reach to new customers and markets with new applications and services, and to improve the experience of existing customers. This can be achieved by exposing existing z assets (which have been developed over time) as APIs for accessing Systems of Record, while leveraging mobile and cloud capabilities with new Systems of Engagement applications. In this session, we will explore business drivers with new Node.js apps ...
As Cybric's Chief Technology Officer, Mike D. Kail is responsible for the strategic vision and technical direction of the platform. Prior to founding Cybric, Mike was Yahoo's CIO and SVP of Infrastructure, where he led the IT and Data Center functions for the company. He has more than 24 years of IT Operations experience with a focus on highly-scalable architectures.
The technologies behind big data and cloud computing are converging quickly, offering businesses new capabilities for fast, easy, wide-ranging access to data. However, to capitalize on the cost-efficiencies and time-to-value opportunities of analytics in the cloud, big data and cloud technologies must be integrated and managed properly. Pythian's Director of Big Data and Data Science, Danil Zburivsky will explore: The main technology components and best practices being deployed to take advantage...
For years the world's most security-focused and distributed organizations - banks, military/defense agencies, global enterprises - have sought to adopt cloud technologies that can reduce costs, future-proof against data growth, and improve user productivity. The challenges of cloud transformation for these kinds of secure organizations have centered around data security, migration from legacy systems, and performance. In our presentation, we will discuss the notion that cloud computing, properl...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.