You are on page 1of 25

Corporate Profile

Our Story
2014 2016

Incorporated Government Advisor


Management Consulting,
Auditing & Training Advisor to the Government of India for their
Data Centre & SWAN projects & E-Dehram
project with Ministry of Finance, UAE.

2018 2021

International Expansion Rebranding


Expansion into UAE, Australia, New
Zealand, United Kingdom, South Africa & Rebranded from VISION ISO to EPROTECT
Philippines through regional partners 360 Solutions Pvt Ltd.
©2021 EPROTECT 360. All Rights Reserved.
ePROTECT 360
Your global compliance services partner

Governance Risk & Compliance


We offer services across 3 broad spectrums

Governance and
Risk Consulting Cyber Security Training

©2021 EPROTECT 360. All Rights Reserved.


Your global compliance services partner

Asia Middle East Australia New Zealand South Africa United States

Our experience and expertise across industry verticals

Banks and Financial Technology and Software Services Oil & Power Aviation Artificial
Services Media Intelligence

E-commerce Portals
Healthcare DOMAIN EXPERTIZE Retail Manufacturing

©2021 EPROTECT 360. All Rights Reserved.


Governance, Risk & Compliance

ISO 27701:2019 Privacy ISO 27032:2012 ISO 20000-1:2018 ISO 22301:2019 Business NIST Cybersecurity Framework
ISO 27001:2013 Information RBI Guidelines
Information Service Management Continuity Management (CSF) ISO 9001:2015 Quality
Security Management System Management System System System Management System

SEBI / IRDAI / ISO 31000 Risk PCI DSS HITRUST CSF Virtual CISO
NPCI Management HIPAA Compliance Compliance SOC 1, SOC 2, & GDPR Compliance
SOC 3 Compliance

Consulting - Implementation - Auditing - Certification


CyberSecurity

Information Security Application Security IOT Devices Digital Forensics Vulnerability Assessment & Security Controls
Penetration Testing Brand Protection Source Code Analysis
Assessments Assessments Assessments Assessment

Red Team
Assessments
Trainings

Information Security G R C like HIPAA, GDPR, ISO Standard Business Continuity / Vulnerability Assessment & Application Security IOT Devices
SEBI, IRDAI, NPCI, PCI, Digital Forensics
Awareness Certifications Resilience Assessment Penetration Testing Assessments Assessments
NESA

Aerospace, Productivity / Quality /


Business Health and Safety best CyberSecurity
Standards, (ISC)2, practices
PECB, ISACA
SOC Service

©2021 EPROTECT 360. All Rights Reserved.


Traditional SIEM vs ePROTECT 360 SOC

©2021 EPROTECT 360. All Rights Reserved.


Traditional SIEM vs ePROTECT 360 SOC
FEATURES EPROTECT 360 MARKET
UEBA Included Extra Cost
NBAD / NDS / IDS Included Extra Cost
Included + no limit on
SOAR Extra Cost
SEAT/Analysts
Threat Intelligence / Threat Analytics
Included Extra Cost
/ Threat Hunting / Security Analytics
Incidence Response Included Extra Cost
Cloud Security (IAAS, PAAS, SAAS, -
Included Extra Cost
AWS, Azure, GCP, OCP)
ML & AI with out of box Alerting and
Included Extra Cost
out Auto/Push button Remediation

Note: Even if you get above service in other Service Providers, there will be lot of resources + time + efforts wasted in
struggling with the false positives because, of 1. lack of comprehensive visibility across on-prem / DC clouds, remote,
Partners access; 2. Lack of complete useful information which we take i.e. logs, flows, user etc.

©2021 EPROTECT 360. All Rights Reserved.


MSS Capabilities

 Robust, large-scale data collection from all data sources (cloud and network, endpoints, identities, etc.) in streaming
set up, which scales to billions of events handling per second with context.
 Includes User & Entity Behaviour Analytics, Network Behaviour Anomaly Detection, Machine learning, Advance
Threat Intelligence, Artificial Intelligence, Automation, Logs Filtering and auto remediation which enhances the SOC
performance by 70%.
 Enhanced data analytics beyond rules with contextual real-time alerts for
“threats-that-matter” and automated response. So you get proper and
detailed reports. You are involved only in new cases and only in L3 level for
taking some organisation level decisions.
 Real time action on Zero Day and DDoS attack.
 DNS Monitoring by default.
 Organisation level of compliance in monitoring.
 Scalable architecture with support for multi-tenancy & data segregation.
 Cost is per device instead of EPS.

©2021 EPROTECT 360. All Rights Reserved.


SOC Workflow

©2021 EPROTECT 360. All Rights Reserved.


Comprehensive Cybersecurity for Digital-Era
(SIEM+SOAR+UEBA+NBAD/NTA+TI+IDS/IPS+ML+AI+VA+EDR:)

A Machine Learning and AI Platform built on


Big/Fast Data Architecture
See Everything
Comprehensive Threat Detection and
Remediation built into single platform

Out of box - Automatically presents only Detect Threats


analyzed/ verified threats - no tuning ever That Matter

Leverages AI to Detect and stop the Threats –


With no human intervention
A purpose built aiXDR agent that tracks all assets even
when they are not on company’s network
Stop the Threat
An integrated solution that covers compliance and a broad
spectrum of use cases

©2021 EPROTECT 360. All Rights Reserved.


Comprehensive Cybersecurity for Digital-Era
(SIEM+SOAR+UEBA+NBAD/NTA+TI+IDS/IPS+ML+AI+VA+EDR:)

Raw Logs: OSs,


Applications, Services, Auto-
Comprehensive
Machine
processes Remediati Visibility
Learning on Policy
Router and Switch Engine
Flows: Netflow, IPFix,
Sflow and Raw Traffic AI With Proactive Threat
Actionabl
e
Detection
User: Windows AD, Intelligen
Global Advanced
DNS, DHCP, LDAP Threat
ce
Real-time
Intelligen Correlatio
Cloud Logs: IaaS, ce n
PaaS, SaaS, Audit, Dynamic Automatic Real-Time
Threat
VPC, Identity Model
STOP Threat Containment &
Engine Elimination
Your Existing
Security System Events
Feature Security
and Alerts
Enrichment
End-points Agents from
Analytics Continuous Compliance
Laptops and Mobile & Reporting
Devices

©2021 EPROTECT 360. All Rights Reserved.


Incident Management Procedure
Our Incident Management procedure follows the workflow illustrated below:

Constituency
IT Assets

DFIR Team Incident Response


Security Events
INITIATE INCIDENT RESPONSE PLAN Required?

SIEM & OTHER HOW TO RESPOND


SPECIALIZED TOOLS • Block activity
Containment • Deactivate account
• Real Time Monitoring Detection & Post-Incident
Preparation Eradication & • Continue watching
• Trending Analysis Activity
Recovery • Refer to outside party
• Advanced Analytics
• Etc. etc.
• Correlation
• Free-form Query
• Visualization
• Threat Intel
• Historical Analysis
Case
Escalation
Real-Time Monitoring

Incident Reported
Constituents Tier-1 Analysts Tier-2 Analysts & Leads

©2021 EPROTECT 360. All Rights Reserved.


SOC Deliverables
Incident Management
SOC Incidents Report Advisories
Portal
• Incidents as per use cases • Daily, Weekly and • Access to all incidents • Patch advisories
configured Monthly Summary • Access to all reports • Consolidated Patch
• Adherence of Incident Report • Access to all log baselines advisory – Monthly
Notification as per SLA • Key Performance • Daily Threat Update
Indicators (KPI) Metric • Data Breach Report -
report – Monthly Monthly
• Use Case Review findings
and remediation plan –
Quarterly
• Trend Analysis and
Threat Report -
Fortnightly
• Anomaly Detection
report – Monthly
• SLA for incident
management

©2021 EPROTECT 360. All Rights Reserved.


Service Level agreements
Service Metric Example KPI
Log collection infrastructure, MSSP support Log Monitoring – 24x7x365
Service availability
staff
Monthly SOC Review & Threat Matrix
Reporting by 5th business day
Report

High - 15 mins
Incident Lead time between alert being raised and
Medium – 30 mins
Management customer being contacted
Low – 60 mins

Log Retention Online raw log retention 4 months (archive for next 8 months)

3 Days
Service Lead time to implement a new monitoring 10 Days – in case flex development
Improvement use case to address each new threat required

©2021 EPROTECT 360. All Rights Reserved.


SOC Deployment Models

Deployment SIEM On-site SIEM in On-Site Remote Remote Shared


Model (Client Premises) EPROTECT 360 Dedicated Dedicated SOC SOC
SOC / Cloud Manpower

M–1 Y N/A Y N/A N/A


M–2 Y N/A N/A Y N/A
M–3 Y N/A N/A N/A Y
M–4 N/A Y Y N/A N/A
M–5 N/A Y N/A Y N/A
M–6 N/A Y N/A N/A Y

©2021 EPROTECT 360. All Rights Reserved.


Dashboard (Sample)

©2021 EPROTECT 360. All Rights Reserved.


Dashboard (Sample)

©2021 EPROTECT 360. All Rights Reserved.


Dashboard (Sample)

©2021 EPROTECT 360. All Rights Reserved.


Our Differentiators

Cost Effective
Every organization may not need a dedicated team of Consultants, Auditors & Trainers. Optimize your costs
by recruiting an expert agency who bring competence and scale at an affordable cost.

Adaptive
Our team can adapt to your changing business needs. Whether you are a startup or an established
organization, our team will adapt to your organization style, tools and marketplace.

Expertise
Our team of Consultants, Auditors & Trainers have a lot of experience with business and security. Having an
established track record and expertise with the tool set and marketplace experience allows our resources to
hit the ground running the moment they are signed up.

Independent
This can be a double-edged sword but having our Consultants, Auditors & Trainers liberates them from office
politics and conflicting agendas.

Established Relations and Connections


All our Consultant/Auditor/Trainers have a built-in network and have many connections with vendors and
industry professionals. Being able to leverage this network can make your growth more streamlined and cost
effective.

©2021 EPROTECT 360. All Rights Reserved.


Global Clients

Our Clients

Domestic Clients

©2021 EPROTECT 360. All Rights Reserved.


Our Team

Kunal Panchamia Sandesh Gupta


Founder & CEO AVP - PMO
CISA, CEH, LA, Six Sigma Champion (Master Black Belt) ISO 27001 Lead Implementer, CSPO
He has around 12+yrs of experience in Business analyst, PMO,
Over 20 years total Experience in Delivering Business Value and
Product Management, Digital Transformation and Training. He
Optimal Solution Results in High-growth Environments across all
worked with ICICI bank thought this 12yrs. He is responsible for
Business Sectors and Verticals like Govt. undertakings, Banking,
overall operation, Project Management & New Product
Finance & Insurance, IT/ITES, Pharmaceutical, Aviation,
Development.
Manufacturing and Energy & Telecom.

Snehalkumar Sangole
Amit Kuar Business Head
Subject Matter Expert
ISO 27001 Lead Implementer
ISO 27001 LA, Certified - GDPR Expert
A dynamic, roll-up-his-sleeves kind of business leader with
Over 10 years of work experience in various industries including over 13 year of work experience in Business Development, PnL
corporate IT Governance, Information Security, System Audits, & Revenue Management, and Pre-sales. He ensures clients get
Data Centre, cloud infrastructure process improvements, maximum value and return on investments with excellent
Operations Excellence, Compliance Certifications & audits. consulting & customer service.

Certifications across the board


o Certified Information Systems Auditor o GDPR Expert and Principal Consultant (EU GDPR) o Hands on experience in Payment Card Industry Data

o Certified Lead Auditor, Lead Implementor, Lead o PECB Certified Lead Pen Test Professional Security Standard (PCI-DSS)

Trainer in various ISO Standards o Certified Ethical Hecker by EC Council o NIST Consultant & Auditor

o Risk Management o Threat Intelligence and Advance Threat Analysis o HIPAA Consultant & Auditor
©2021 EPROTECT 360. All Rights Reserved.
Thank You

Registered Office: 501/Vishwadeep Heights, Mahavir Nagar, Kandivali West, Mumbai-400067


India

Corporate Office: B-708, 7th Floor, Kanakia Wall Street, Andheri Kurla Road, Andheri East,
Mumbai-400093 India

www.eprotect360.com
Global Expansion - Contact
Kunal.Panchamia@eprotect360.com
+9199300 70535
Sales / Inquiries
Snehalkumar.sangole@eprotect360.com
+919987023167

You might also like