Managed Security Network Monitoring Service

Published on Slideshow
Static slideshow
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Scene 1 (0s)

[Audio] Let's dive right in! Licensed by the Philippine Department of I.C.T., BNS Hosting.net can share details of our managed security Network monitoring service, today..

Scene 2 (13s)

[Audio] Why is there a need for this service? What's the gap here ? Did you know the shocking fact that the AVERAGE ransomware payment in the Philippines was 40 million in 2020. This represents about 42% of PH companies that were hit. It gets worse, by 2021, that figure increased to 69%!.

Scene 3 (38s)

[Audio] Why is security so bad in the Philippines? Well, one of the metric is the days it takes to detect a breach. World-wide, this is now 287 days. Did you ever wonder why this takes so long? This, despite the massive investments in network security devices? Well, the sad fact is that despite these investment, no one is actively looking at all the digital evidence or digital trail left behind by cyber attackers. It is usually only when a serious incident has been noticed that management suddenly demands an investigation. And that is mostly the time that system administrators or security professionals are called in to examine the 'evidence'. I can't say I blame them. Each network device will generate a ton of data. And it is both tedious, repetitive and unglamorous work to read these logs. This task is best done by subordinates…Until you realize that everyone else has something better to do with their time. So, no one ends up looking at them. And when no one monitors these, hackers get undetected for a long time..

Scene 4 (1m 55s)

[Audio] We can help with this. Our service more than pays for itself if you count at least four of the major benefits : First: We can detect Bit errors in your networks. Staff would end up waiting longer for online tasks to complete. If these lines were in tip top condition, your staff can get their work done faster. There is no more productivity wasted by waiting for retransmissions of lost packets. Second: We can report links when they go down. When your vital internet links go down at night, and even worse when this happens over a long weekend, it usually gets noticed on the next business day. By then it would take additional delay before the links can be restored. Having a network monitoring team in place, gets these downtimes reported earlier. Downtimes are thus minimized. Third: Attacks are usually preceded by probing attacks. This is where attacks send traffic to test your defenses and find out which servers are vulnerable. If we monitor these activities and perform countermeasures, we have a higher chance of stopping them before they launch their main attack Fourth: And even if they penetrate your networks, their lateral attacks - where they look for other targets INSIDE your network, might be discovered by monitoring your event logs or error logs. This is another chance of stopping them or minimizing the damage that the hackers can do. Finally: How often has an important service die during the night? Our monitoring team can alert you to these. So these services can be restarted either remotely or on- site..

Scene 5 (3m 48s)

[Audio] Again, network devices usually leave a digital trail of who came in and who went out. An analogy would be like your security guards' log book. In network monitoring, we call these the syslogs, snmp, logs and alert data. From these data, we can monitor the health of your network and generate dashboard to more efficiently gain visibility into your network. And over time, our team learn your ' baseline' behaviors. Attacks that disrupts these baseline often trigger our notification..

Scene 6 (4m 25s)

[Audio] Our notification levels will depend on severity of the incident. Normal ones trigger email alerts. And more serious ones will also trigger an escalation call to your on-duty engineer or to your senior management.

Scene 7 (4m 42s)

[Audio] Your company's network can benefit from big data analytics. Optional machine learning can create predictive models. These models can predict and classify which traffics are MORE likely to be harmful to your network. These can then be used by your firewall rules. The other optional service is our Network graph analytics. Graph analytics help you understand the complex interplay between your devices in your network and those from external parties. When combined, these two added services help to both secure and optimize your network..

Scene 8 (5m 22s)

[Audio] DICT recognized BNS Hosting Inc. as a Cybersecurity Assessment Provider ( ISMS) effective 3rd June 2022 and that Bitstop Network Services Inc., will now included in the DICT-Recognized Cybersecurity Assessment Providers listed in the DICT website..

Scene 9 (5m 40s)

[Audio] Contact us now to learn more about this service offering. We are also on Facebook, Twitter, Linkedin, WhatsApp and Viber..