Security Sales Play Flashcards

1
Q

Security Breach Cost:

A

hese include an average of forty-six days to respond to a breach and mean cost of 7.7 million dollars per incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DXC Quals Security

A

Global, end-to-end security expertise – We serve as a trusted advisor with full service capability in security services to deliver integrated solutions to all industries
Technology independent advice – Vendor-agnostic security services provider and prime security integrator with clear view of industry best practice across all security technology controls
Global presence with 4000+ security professionals serving 70% of the top 100 companies in the Fortune 500; Thousands of highly accredited security professionals and former CISOs from global industries
Deep expertise in integrated risk management, security architecture, and the cyber defense and security operations domain
Industry leading threat detection and response with around-the-clock, around-the-world management and monitoring of your security operations for your hybrid environment
Years of hands-on advisory expertise consolidated into NewCo cyber reference architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IBM: IBM is seen as the leader in managed security services (MSS)
Certain Offerings are stronger than those at DXC (for example, threat research)

A

DXC has broader portfolio through established partnerships with various security technology vendors and customized technology bundling
DXC is technology independent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Dell SecureWorks: Commonly cited as one of the market leaders by analysts
Very strong in endpoint threat management and advanced threat protection

A

DXC has strong presence in EMEA and APAC

SecureWorks lacks scale to operate globally in Fortune 50 and Government organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Symantec is an established pure play security vendor offering robust set of capabilities, global presence and client base

A

DXC provides security management in addition to monitoring
DXC has integrated consulting and advisory capability
DXC is comfortable serving all size enterprises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Verizon:Positioned as leaders on managed security services. They differentiate with strong network management and monitoring capabilities

A

DXC has a strong DNA of serving enterprise clients across all domains, not just network
DXC has clear security focus – Verizon’s focus on wireless and media priority puts future security services business in question

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ATT: AT&T portfolio is highly focused on network security

A

DXC offers end-to-end MSS portfolio versus AT&T that just focuses on network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BT offers a broad set of managed security services

BT has a comprehensive cloud security and BYOD security portfolio

A

DXC is recognized as a leader in managed security services by most third-party analysts
DXC is perceived to be a strong global player BT has much lower visibility among buyers in AMS and APJ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DXC Perspective

A

DXC Security will continue to advocate three core principles to protect your organization: Protect, Detect and Respond, and Recover and Comply.
Let’s start with protect, which involves assessing abilities, identifying gaps, hardening the surface area, and designing a cyber-resilient environment.
With detect and respond, organizations need to effectively respond to today’s advanced threats by establishing and maintaining the best possible preemptive protection capabilities. This includes system design, monitoring, using analytics, and effective response.
Last, we look at recover and comply. If the worst happens it is paramount to ensure business continuity. Recover and comply includes back up and recovery solutions and services.
Take a moment to review this material.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3 Service Areas

A
  1. Security Strategy & Risk Management.
  2. Integrated Security Operations and Cyber Defense.
  3. Identity and Access Management.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cyber maturity Review

A

50k 4 weeks

Specifically the Offering can:
Prioritize and optimize security investment by determining the right initiatives,
Understand visibility of maturity gaps and compare with industry peers,
Evaluate internal security monitoring and response capabilities,
Develop a road map for board-level discussion and,
Develop a three-year business case and planning cycle.
Review the client business outcomes, pricing, and delivery time information on your own.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cyber Attack Simulation

A

50-100k 4 weeks Delivers a realistic cyber attack by emulating existing threat actor tools, techniques, and procedures.
It leverages HPE cyber threat intelligence to assess people and process, as well as technology.
It also measures detect-and-respond capabilities against industry specific attack simulation.
Lastly, it develops a detailed report that measures resilience to cyber attacks, along with next step recommendations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Advanced Compromised Assessment

A

4-6 weeks 150-200k: Advanced Compromise Assessment from HPE and FireEye. This Offering can proactively evaluate enterprise environments for the presence of targeted attacker activity.
More specifically it:
Investigates the state of enterprise security posture,
Details areas of security gaps and recommended actions,
Creates a long-term, strategic security roadmap leading to a partnership to address their security gaps, and
Recommends impl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Privaledged Account Security Diagnostics

A

30k 4 weeks

Privileged Account Security Diagnostic.
This Offering can help clients more effectively mitigate the heightened risk associated with privileged accounts.
It results in:
Increased efficiency through consolidation of password management process, resulting in additional availability of resources,
Improved visibility into the services being used by constituents,
Reduction in security risk for the business by eliminating ninety-five percent of hard-coded passwords and manual password change processes, and
Alleviated compliance pressures through regular password rotation and centralized audit reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly