Welcome!

News Feed Item

CSC Expands Suite of Cloud-Based Cybersecurity Offerings

CSC (NYSE: CSC) today announced the expansion of the company’s Cloud Cybersecurity Services portfolio with three enhanced offerings for clients that help protect CSC cloud solutions from the constantly evolving and escalating threat landscape.

As enterprise and public sector customers turn to next-generation cloud infrastructure-based services to maximize business and economic advantage, the need for effective security controls, regulatory compliance and risk mitigation have become increasingly important. Recent research by McKinsey and the World Economic Forum (The rising strategic risks of cyberattacks) found that companies are struggling with their capabilities in cyber risk management, with more than half of all respondents believing that cybersecurity is a strategic risk for their companies.

CSC Cloud Cybersecurity Services enable organizations to enhance the security of their cloud solutions from CSC. The suite of services and capabilities have been designed, built and integrated to meet the demands of a dynamic cloud business model, and provide a flexible, usage-based model that is integrated and aligned with CSC’s Managed Cybersecurity strategy. This allows both CSC self-service and managed cloud customers the flexibility and efficiency to apply more advanced levels of security functionality as the regulatory, compliance and security risk of the organization demands. CSC's enhanced Managed Cloud Cybersecurity Service integrated solutions are:

  • Cloud Endpoint Protection (CEP) – Offers 7x24x365 monitoring and alerting for CSC cloud- based host protection. CEP is scalable and can be easily deployed into a cloud environment and infrastructure with the ability to dynamically add additional servers and hosts at any time. Innovative and industry-leading agentless Anti-Malware from Trend Micro Deep SecurityTM is included as baseline functionality, with agentless or host based Intrusion Protection and File Integrity Monitoring also available to help satisfy regulatory demands.
  • Cloud Managed Vulnerability Assessments (CVMA) – Provides centrally managed vulnerability scanning and configuration compliance monitoring for servers, Virtual Machines (VM’s) and cloud infrastructure. Vulnerability scanning is offered as a baseline functionality server configuration and compliance monitoring is also available as regulatory demands require. CSC leverages Tripwire® IP360™, to comprehensively profile designated network devices and include up-to-date coverage of the latest operating systems, applications, and vulnerabilities on the network. Tripwire IP360’s agentless architecture is designed for rapid deployment and ease of management across large, globally-distributed networks.
  • Cloud Security Incident and Event Monitoring (CSIEM) – Comprises log collection, log storage, event correlation and security incident alerting and reporting on CSC cloud servers and VM's, supported by 7x24x365 SOC monitoring and alerting. In addition, CSC Cybersecurity's integrated Global Threat Intelligence (GTI) feeds the SIEM, to provide advance warnings of potential security threats and exploits impacting the cloud environment. CSC leverages HP Arcsight as the market leading SIEM platform for global SOC integration, to help customers overcome the evolving threat landscape with continuous real-time event monitoring across the cloud environment.

“Customers considering the adoption of public and private cloud solutions want to strengthen the protection of CSC cloud infrastructure offerings from the rapidly changing threat landscape,” said Samuel Visner, CSC’s vice president and general manager for Cybersecurity. “Our growing suite of Cloud Cybersecurity Services now offers both self-service and CSC cloud management customers a resilient framework of cloud security controls specifically built for the Virtual Computing Environment (VCE) coalition, available as OPEX services. This provides elasticity to support the dynamic business requirements that customers require on their premises or in the CSC data center environment.”

The CSC Cloud Cybersecurity Services portfolio offers As-a-Service solutions from the most efficient enterprise cloud security vendors to ease migration and transformation capabilities, which are uniquely designed for the cloud in a secure, reliable, transparent manner. The growing suite of services helps customers support and demonstrate regulatory compliance mandates (ISO27001, FISMA, NIST, HIPAA, PCI) against specific regulatory security controls. In addition, the Cloud Cybersecurity Services are managed and monitored from CSC's global Cybersecurity Operations Centers providing reach and scale where required. CSC’s layered architecture helps protect clients against malicious threats using industry recognized leading software, which is available in an agentless deployment and delivers more efficient resource utilization and higher VM densities than traditional agent-based solutions.

About CSC

CSC is a global leader of next-generation information technology (IT) services and solutions. The company's mission is to enable superior returns on clients’ technology investments through best-in-class industry solutions, domain expertise and global scale. CSC has approximately 79,000 employees and reported revenue of $13.0 billion for the 12 months ended March 28, 2014. For more information, visit the company's website at www.csc.com.

Click here to subscribe to Mobile Alerts for CSC.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Unsecured IoT devices were used to launch crippling DDOS attacks in October 2016, targeting services such as Twitter, Spotify, and GitHub. Subsequent testimony to Congress about potential attacks on office buildings, schools, and hospitals raised the possibility for the IoT to harm and even kill people. What should be done? Does the government need to intervene? This panel at @ThingExpo New York brings together leading IoT and security experts to discuss this very serious topic.
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
CloudJumper, a Workspace as a Service (WaaS) platform innovator for agile business IT, has been recognized with the Customer Value Leadership Award for its nWorkSpace platform by Frost & Sullivan. The company was also featured in a new report(1) by the industry research firm titled, “Desktop-as-a-Service Buyer’s Guide, 2016,” which provides a comprehensive comparison of DaaS providers, including CloudJumper, Amazon, VMware, and Microsoft.
"Dice has been around for the last 20 years. We have been helping tech professionals find new jobs and career opportunities," explained Manish Dixit, VP of Product and Engineering at Dice, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
"At ROHA we develop an app called Catcha. It was developed after we spent a year meeting with, talking to, interacting with senior citizens watching them use their smartphones and talking to them about how they use their smartphones so we could get to know their smartphone behavior," explained Dave Woods, Chief Innovation Officer at ROHA, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"ReadyTalk is an audio and web video conferencing provider. We've really come to embrace WebRTC as the platform for our future of technology," explained Dan Cunningham, CTO of ReadyTalk, in this SYS-CON.tv interview at WebRTC Summit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Rapid innovation, changing business landscapes, and new IT demands force businesses to make changes quickly. In the eyes of many, containers are at the brink of becoming a pervasive technology in enterprise IT to accelerate application delivery. In this presentation, attendees learned about the: The transformation of IT to a DevOps, microservices, and container-based architecture What are containers and how DevOps practices can operate in a container-based environment A demonstration of how ...
Cloud Expo, Inc. has announced today that Andi Mann returns to 'DevOps at Cloud Expo 2017' as Conference Chair The @DevOpsSummit at Cloud Expo will take place on June 6-8, 2017, at the Javits Center in New York City, NY. "DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited to help the great t...
SYS-CON Events announced today that Fusion, a leading provider of cloud services, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Fusion, a leading provider of integrated cloud solutions to small, medium and large businesses, is the industry’s single source for the cloud. Fusion’s advanced, proprietary cloud service platform enables the integration of leading edge solutions in the cloud, including clou...
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, sha...
Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his general session at @DevOpsSummit at 19th Cloud Expo, Phil Hombledal, Solution Architect at CollabNet, discussed how customers are able to achieve a level of transparency that e...
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
"Venafi has a platform that allows you to manage, centralize and automate the complete life cycle of keys and certificates within the organization," explained Gina Osmond, Sr. Field Marketing Manager at Venafi, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.