Security Services

SecurityOps was built by our customers, for our customers. Having been in business for over 40 years, Champion understands that security is not about how many tools you own.It is about people, process, and technology. To be risk adverse, you must have the right solutions, at the right time, integrated together to optimize operational efficiency and keep the bad actors out of your business.

Compliance Driven Security Solutions

app_security

Application

Protection from Malicious Code
App Base Demographics, Usage Trends, Security Alerts

assets

Assets

Discovery
Bi-Directional integration with CMDB’s

CASB

CASB

Deep support for top cloud apps
Secure Office 365, Google, and more

Compliance

Compliance

GDPR
PCI
SOX
HIPAA
GLBA
NERC
FERC
FISMA

Database-security

Database

Discover and classify sensitive data
Encryption, masking, redaction, dynamic blocking and alerting

DLP

Data Loss Prevention (DLP)

Protect your IP and personal information
Granular control of all data movement

DNS Security

Domain Named System DNS

Block access to malicious sites, objects
Automated defense against DNS-based volumetric attacks

EDR

Endpoint Detect & Remediate (EDR)

Ransomware protection against all threats
Prevent attacks online / offline
Single-click remediation

email-security

Email

Block malware, phishing, and spam emails
Advanced threat protection, and time-of-click analysis

Files security

Files

Automated data collection
Real-time alerting and protection
Monitor and prevent threat in real-time

firewall

Firewall

Detects and controls application usage
Supports advanced identity awareness for stress-free policy enforcement

IAM

Identity and Access Management

Full remote privileged access
Single Sign-On (SSO)
Password, soft-token, hard-token, biometric, and out-of-band mobile device authentication

IOT

Internet of Things (IoT)

Detects and profiles devices as they connect to your network
Monitors devices continuously for compliance and erroneous behavior

IR

Incident Response

Intelligent orchestration
Dynamic playbooks
Privacy breach preparation and response

Mobile Security

Mobile

Patch and Update Management
Separate work from personal data
Secure Mobile Mail & Chat
Advisor with cognitive insights and analytics

MSSP

MSSP

Threat Detection & Response
Intrusion Detection
Vulnerability Management
Log Management
SaaS Vendor Security
SOC-as-a-Service

patch

Patching

Delivers real-time control from a single console on/off network
Provides automated patch management
Offers greater visibility into patch compliance

PAM Security

Priviledged Access Management (PAM)

Enterprise Password Vault
Gain visibility and control over privileged credentials
Enforce least privilege on endpoints without compromising productivity or security

SIEM

Security Intelligence Event Management (SIEM)

Ingest vast amounts of data from on-prem and cloud sources
Applies built-in analytics to accurately detect threats
Correlate related activities to prioritize incidents
Threat intelligence and support for STIX/TAXII

Training

Security Awareness Training

Interactive training modules
Compliance modules

Learn More

Visibility

Visibility

Auto-Discover and classify everything in your enterprise
Visualize everything in a live activity map
Quickly prioritize human expertise and radically speed up investigation with full context and workflows automation

web

Web

Block malware, phishing, ransomware, and malicious sites
Stop zero-day threats and advanced evasive malware via cloud sandboxing
Enforce web usage policies
Protect any user, anywhere, on any device

Industry Solutions

Champion has 40+ years experience serving customers in all industries. See more in-depth information pertaining to financial and healthcare organizations below.

Security Resources

Security

Security solutions offered by Champion Solutions Group include Endpoint Security, Compliance and Regulatory Requirements, Virus and Zero-day Malware Protection, Firewall, SIEM, Identify and Access Control and more. Our expertise enables customers to operate without fear, particularly in the Finance and Healthcare sectors.

The 2017 Threat Intelligence Report

Whether deluged by spam or targeted by cybercrime, organizations of all kinds clearly must continue to practice security fundamentals. To complement a solid information security foundation, organizations can continue to engage in collaboration to learn best practices and share findings and insights with colleagues. The faster they react to cybercrime findings and share their experiences across the security community, the less time each malware variant can live and or see successful fraud attacks. As a result, cybercrime can become much less financially viable for attackers, as exposure can weed out large numbers of fraudsters who abandon their criminal pursuit for lack of profit. Beyond sharing intelligence, IBM Security has evolved to bring cognitive capabilities into the fight against cybercrime, with the goal of transforming it altogether. IBM Watson® for Cyber Security is already being used by 40 organizations, where it is helping spot cyber attacks. Cognitive computing is not only 30 to 40 percent faster than traditional systems,69 it also continually learns and doesn’t repeat the same mistake twice, reducing false positives, and keeping up with threats. Before long, cognitive cybersecurity could outsmart human cybercrime and turn the tables on cybercriminals.

Cisco 2017 Annual Cybersecurity Report

As the attack surface increases, defenders must focus on their most important goal: reducing their adversaries’ operational space. Adversaries work nonstop to evolve their threats, move with even more speed, and find ways to widen their operational space. The explosive growth in Internet traffic—driven largely by faster mobile speeds and the proliferation of online devices—works in their favor by helping to expand the attack surface. As that happens, the stakes grow higher for enterprises. The Cisco 2017 Security Capabilities Benchmark Study found that more than one-third of organizations that have been subject to an attack lost 20 percent of revenue or more. Forty-nine percent of the respondents said their business had faced public scrutiny due to a security breach. The Cisco 2017 Annual Cybersecurity Report presents our latest security industry advances designed to help organizations and users defend against attacks. We also look at the techniques and strategies that adversaries use to break through those defenses. The report also highlights major findings from the Cisco 2017 Security Capabilities Benchmark Study, which examines the security posture of enterprises and their perceptions of their preparedness to defend against attacks.

How does a Ransomware Attack Happen?

See how an effective ransomware attack comes together. This is why today’s enterprises require effective security. For more on how Cisco looks to keep ransomware at bay, go to: https://cs.co/9001BAFGf.

www.youtube.com

2017 Data Breach Investigations Summary

If you haven’t suffered a cybersecurity breach you’ve either been incredibly well prepared, or very, very lucky. Are you incredibly well prepared? Whether it’s design plans, medical records or good, old-fashioned payment card details — someone, somewhere will see it as their meal ticket. Most cybercriminals are not fussy about who they steal from. You could be the next victim of a data breach. And that could impact every part of your business. That’s why everyone in your company — not just the security experts — needs to understand the threats and how to mitigate them. The 2017 DBIR will put you on the right track. But if you’re pushed for time, read our executive summary for all the key findings and our top tips. Champion Solutions Group can help protect you and keep your business safe

IBM Films presents: Hacked

When it comes to identifying and remediating breaches, time is of the essence. Organizations need to fix problems in minutes before they become major business disruptions.IBM BigFix helps clients bridge the gap between security and IT operations with common tooling and reporting for the continuous compliance of security, operational and regulatory policies. It’s a proven, cost-effective approach to ensure continuous compliance and real-time incident response across all endpoints–on and off the network.For more information, please visit https://ibm.co/1Nj3CCV

www.youtube.com

Forrester Report: Endpoint Security Takes Center Stage As A Must Have

The fight today between security professionals and attackers is an uphill battle, as endpoints multiply and attackers get better at exploiting vulnerabilities before they can be patched. Antivirus, the longtime staple of endpoint protection, can no longer be relied upon to protect against these never-before-seen threats. To protect against these zero-day threats, security pros need to adopt new solutions that can protect against never-before-seen malware and exploits of unpatched vulnerabilities in the OS, browser, and third-party applications. Today’s endpoint protection solutions offer varying levels of protection against these advanced threats, and decision-makers need to weigh the protection offered against end user disruption when choosing the best technologies to defend their organizations.

Benefits of Security Intelligence on Cloud

Watch this short video and listen to Vijay Dheap, IBM Global Product Manager for Security, describe the benefits of Security Intelligence on Cloud, a new offering from IBM. These include lowering costs, increasing efficiency, shifting from a CapEx to an OpEx model, and improving compliance and reporting. Vijay also touches on the advantages of incident forensics and the rapid analysis of security offenses. For more information, please visit https://ibm.co/1zlRM6Y

www.youtube.com

Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar

Security teams can be overwhelmed by a sea of vulnerabilities–without the contextual data to help them focus their efforts on the weaknesses that are most likely to be exploited. Cyberthreats need to be stopped before they cause significant financial and reputation damage to an organization. You need an endpoint security platform that can detect threats, prioritize risks and respond within minutes to shut down an attack or vulnerability that could compromise your endpoints.IBM BigFix seamlessly integrates with IBM QRadar to provide closed loop vulnerability management, accelerating risk prioritization and incident response to mitigate potential attacks giving you an integrated threat protection system to keep your endpoints and data secure.For more information, please visit https://ibm.co/1oSThIF

www.youtube.com

Combating Advanced Threats with Endpoint Security Intelligence White Paper

To make vulnerability management more effective, organizations need an integrated approach that incorporates both endpoint control and network context into the remediation process. IT staff need to know which vulnerabilities are scheduled to be patched by an endpoint management system and which ones are not, to help ensure that remediation efforts are prioritized and directed most efficiently. In addition, IT staff need to be able to quickly take action on security intelligence and make necessary updates across all endpoints within an organization.

Top Recommendations to Prevent Ransomware White Paper

Ransomware has evolved from a low-grade nuisance to a sophisticated multimillion-dollar criminal business that now targets both individuals and corporations. It is a criminal business model that uses malicious software to cryptographically hold your personal data hostage. While an increasingly urgent challenge, ransomware can be prevented through proper training, specific adjustments to the current IT environment, and advanced endpoint technology.

Top 3 Security Considerations for the Cloud White Paper

Data centers are evolving to include a mix of static hardware and cloud computing technologies. This evolution has led to lower CapEx costs, advances in operational efficiencies, and an improvement in data center hardware infrastructure effectiveness. However, with great change comes great challenge. While the threats remain the same, there are differences between how cloud-based computing technologies should be protected and securing traditional hardware-based data centers.

CBI Health Group Case Study

As one of the leading healthcare providers in Canada, CBI Health depends on its infrastructure to connect more than 240 offices and thousands of mobile users to its primary data center, which contains all the company’s data and applications. With so many possible entry points for cyberattacks, CBI Health needed to protect the data center from all kinds of threats. The healthcare firm chose the Palo Alto Networks Next-Generation Security Platform to perform that task because of the security company’s reputation for innovation and quality.

How a Healthcare Organization is Improving Security of Patient Data and Records

IBM and ESM Technology Helping Infirmary Health System Secure EndpointsWatch this video and learn about how IBM and ESM Technology worked together to improve security at Infirmary Health System. Infirmary Health System, using ESM Technology, IBM BigFix and IBM Security QRadar SIEM, was able to increase endpoint patching success rates from 40% to 90%, reduce software deployment time from 7 weeks to 2 days, gain visibility to malware and hackers on their network, maintain regulatory compliance, and improve the security of their patient data and records. To know more about:Security Intelligence and Analytics: https://ibm.co/1nbIRBe IBM QRadar Security Intelligence Platform: https://ibm.co/1t4MyIz IBM BigFix: https://ibm.co/Wi7fpW Learn more about IBM Security visit: https://ibm.co/ibmsecurity

www.youtube.com

Penn State expects $300,000 in yearly energy savings with IBM BigFix

John Tyndall, IT manager at Penn State, discusses how the university uses IBM BigFix software to simplify the administration of 32,000 computers. Learn more about IBM BigFix :https://ibm.biz/EndptMgrRead the IBM case study (https://ibm.biz/BdFAhz) as well as this update from Penn State: https://ibm.biz/BdFzxcStay in Touch:• Subscribe to our YouTube channel: https://bit.ly/1csopXf• IBM Client References: https://bit.ly/1hzYvlB• IBM Client References Mobile Site: https://ibm.co/18i16Mv • Follow us on Twitter: https://bit.ly/1baj1pD

www.youtube.com

Champion Solutions Group has over 40 years of expertise in delivering customized information technology solutions across all platforms for mid-sized to large organizations. Our people want to work with your people. For more information, visit www.championsg.com or contact us at 800-771-7000 to learn how our proven methodology can help your organization increase productivity, reduce costs and mitigate risks.

Contact our knowledgeable team today to learn how our 40 years of experience can empower your organization to reduce costs, increase productivity, and mitigate risks.