Download Now - CSG Invotas

AUTOMATED
THREAT
RESPONSE
Automated Threat Response
solves your biggest problem
when cyber attacks flood
your network — response time.
csginvotas.com
THE PROBLEM
Cyber attacks are flooding you, and you can’t stop them fast enough.
Your limited staff, multiple security tools and slow approval
process prevent you from responding in seconds.
When you respond faster, you dramatically
reduce your exposure to risks
WHY ARE YOU SO SLOW?
and associated costs.
INCIDENTS
81% say the number
of security events
increased or remained
the same in 2013.*
The number of tools
and their complexity
continue to increase.
THREATS
TOOLS
STAFF
It can take months to detect a threat.
It can take days, weeks or months to resolve it.
The longer it takes, the more you are exposed.
* Survey by IDG Research on security automation: info.csgi.com/idg-survey/
Staffing levels
remain the same
to slightly higher.
THE ANSWER
Automated Threat Response solves your biggest problem when cyber attacks flood
your network. Now, with your tools, workflows and processes integrated into a single
console, you can detect and contain threats, protect your data, prevent revenue loss,
and preserve your company’s reputation – all in just seconds.
An Automated Threat Response framework uses these three steps to accelerate your
response: Unify, Orchestrate, and Automate.
OR
C
Now your analyst can do more – faster –
Y
ACT
AU
T O M AT E
ATE
STR
HE
UN
IF
than ever before.
UNIFY YOUR DEFENSES
Identify and connect to the devices and data feeds you already
use to manage and defend your network.
Your success hinges on your security analysts’ ability to rapidly investigate events,
weed out false positives, and enrich data from multiple feeds to deliver actionable
information. Their efforts are hindered by manual and repetitive tasks, requiring
them to log into a multitude of disparate solutions.
By unifying incident-related data and your security
technologies under a single management platform,
NETWORK DETECTION
AND PREVENTION
GATEWAY SECURITY
APPLIANCES
DATA FEEDS
Connect your technologies to
integrate your defenses.
Access and control your
entire security architecture
from a single console.
COMPLIANCE
SOLUTIONS
NETWORK AND
SECURITY
INFRASTRUCTURE
OR
C
Y
ACT
AU
ATE
STR
HE
Your Defenses
you come under attack.
UN
IF
UNIFY
you can save time and resources when
TICKETING
SOLUTIONS
T O M AT E
MALWARE
DETECTION
SIEM
VULNERABILITY
SCANNERS
INTELLIGENCE
FEEDS
ORCHESTRATE YOUR RESPONSE
Execute the digital cyber playbook that puts into action the
processes you have documented and approved.
Your runbook, or cyber playbook, is your approved list of procedures for your analyst to
follow. In most security operations, errors happen and slow down your response. More
importantly, you have no way to transfer knowledge when staff turnovers occur.
You can move beyond paper compliance to a fully digital workflow framework that
provides both control and flexibility. Execute digital response plans by fusing people,
processes and technologies into pre-approved, extensible and measurable workflows.
ACTIONS
Your Response
TECHNOLOGY
ORCHESTRATE
SECONDS
CSG Invotas Security Orchestrator
Continuous
Monitoring
Forward to
Invotas
Create
Ticket
Block C2 IP
at Firewall
Update
Ticket
Disconnect
User
Disable
Account
Send
Custom
Emails
Export
PCAP
MALWARE
DETECTION
SIEM
TICKET
TRACKING
FIREWALL
AND VPN
TICKET
TRACKING
FIREWALL
AND VPN
ACCESS
MANAGEMENT
MAIL
SERVER
NETWORK
FORENSICS
Compromised VPN Response Example
AUTOMATE YOUR WIN
Accelerate your responses to attacks by automating
the manual tasks that distract you from critical analytical work.
Analysts are often buried in time-consuming manual tasks, which can lead to mistakes,
missed alerts, and poor performance.
AUTOMATE
Your Win
USE CASE
Keep your analysts focused on the mission by reducing the need for manual tasks.
This will amplify your team’s capabilities for speed and capacity. By automating small
actions that can be integrated with other manual or automated actions in a workflow,
you stay in control and increase accuracy. This will ensure that you are fast, efficient
and effective.
Reduced Resolution Time by 98%
In one company, it took an analyst 45 minutes to identify and resolve
an infected VPN user. This translated into 90 hours of employee time
each month. Orchestration and automation reduced resolution time to
1 minute, giving the company a 98% efficiency gain.
ACT WITH CONFIDENCE
An Automated Threat Response unifies, orchestrates and automates
to enable you to respond at machine speed.
Security orchestration with automation helps you greatly reduce the time it takes
to contain and mitigate security incidents. Realize the full potential of your security
investments at machine speed.
ACT
With Confidence
UNIFY
ORCHESTRATE
AUTOMATE
BENEFITS
BENEFITS
BENEFITS
Manages your network
from a single console
Synchronizes large-scale
changes at machine speed
Executes pre-approved
and tested responses
based on trigger events
Presents relevant data
quicker for event analysis
Reduces time to respond
to threats through preplanned actions
Integrates with your
existing tools
Saves you money by
requiring fewer personnel
to perform rote tasks
Uses any sensor output
Audits and measures
repeated actions for
improved performance
Automates rote tasks
to respond in real-time
without errors
Uses drag-and-drop
functionality to speed
your response
Supports creation of new
courses of action on the fly
CSG INVOTAS
™
SECURITY ORCHESTRATOR
UNIFY
ORCHESTRATE
Your Defenses
Your Response
THE SOLUTION
CSG Invotas Security Orchestrator™ integrates threat data and security
technologies into a single console, accelerating your security.
Invotas Security Orchestrator is an enterprise software solution composed of a proven
carrier-grade, speed-and-workflow engine, out-of-the-box plug-ins, a customizable
modern user interface, and a cyber playbook library. It fits all enterprises and is
hardware and operating system agnostic. Security Orchestrator takes feeds from
SIEMs and threat intelligence solutions as triggers to start
digital response workflows that pulls vital system data
GATEWAY SECURITY
APPLIANCES
for context and directs actions to your security tools.
Low-cost deployments and federated
NETWORK DETECTION
AND PREVENTION
options are available.
COMPLIANCE
SOLUTIONS
NETWORK
INFRASTRUCTURE
Network and
Security
Infrastructure
AUTOMATE
ACT
Your Win
With Confidence
SIEM
Invotas
Security
Orchestrator
TICKETING
SOLUTIONS
MALWARE
DETECTION
Intelligence
Feeds
VULNERABILITY
SCANNERS
MEET CSG INVOTAS
CSG Invotas, an enterprise security business unit of CSG International
Inc. (NASDAQ: CSGS), is focused on automated threat response
capabilities built on proven carrier-grade activation technology.
For more than 30 years, CSG has amassed a track record in building
automated systems that solve business challenges, improve operations,
preserve continuity and enhance profitability. CSG Invotas builds on
this heritage with innovative security strategies that inspire CIOs and
CISOs to think differently about secure enterprise management.
Pipeline
INNOVATION
AWARD
WINNER
2014
Some CSG International Clients
To learn more, contact CSG Invotas at:
www.csginvotas.com or 1-844-468-0827
Copyright © 2014 CSG Systems International, Inc.
and/or its affiliates (“CSG”). All rights reserved.