Presented by: Technology Infrastructure Services for the digital enterprise – fast & secure
Bharat Sanchar Nigam Ltd. is the world’s seventh largest telecommunications company, providing a comprehensive range of telecom services in India: Wireline, CDMA mobile, GSM Mobile, Internet, Broadband, Carrier services, MPLS- VPN, VSAT, VoIP services, IN services etc. Presently it is one of the largest and leading public sector units in India. Scaling new heights of success, the present turnover of BSNL is more than Rs.351,820 million (US$ 8 billion) with net profit to the tune of Rs.99,390 million (US$ 2.26 billion) for last financial year. The infrastructure asset on telephone alone is worth about Rs.630,000 million (US$ 14.37 billion). The turnover, nationwide coverage, reach, comprehensive range of telecom services and the desire to excel has made BSNL the No. 1 Telecom Company of India. About BSNL
IDC Service Landscape IT Transformation Service IT Continuation Service IT Infrastructure Service Insights as a Service AI IOT Backup as a Service DR as a Service Data Protection as a Service Managed Security as a Service Managed Services Infinite Vault Cloud CDN Data Center VDI Services Landscape Technology Landscape Transform the technology landscape including existing mission-critical applications with enterprise class cloud services. Leverage expertise to take infrastructure for granted – current & future.
InfiniteData Center Colocation Hosting Hybrid On-Premise Cloud Private Cloud on 3rd Party DC Burst out Full range of datacenter services @ HDDC 28MW facility in Bangalore, 20MW DC in Mumbai HDDC, Bangalore Colocation Hosting 1,000 Racks Hybrid 230 Racks Delhi NCR 100 Racks Mumbai 2 284 Racks Ahmedabad
IDC Datacenter Footprint NCR (Faridabad) Ahmedabad Mumbai Flagship HDDC TM Bangalore 15 KW/Rack 1.34 Design PUE 3500 Racks 36 MW 100 Gig BW 4 ACTIVE DCs Physical Presence of DC Facilities across India geography Highly Efficient Operations - Lowest Industry PUE Inter- connected DCs on multi- gigabit BW
Compliance We stringently follow guidelines for meeting these compliances & certifications. We undergo internal and external audits on these processes on regular basis. Additionally customer can access his infrastructure for conducting any third- party audits. Any audit assistance required from NxtGen can also be subscribed at an extra cost. We also comply with designs required for our customers for PCI- DSS and RBI audit requirements. CSA STAR is the industry's most powerful program for security assurance in the cloud. ISO 27001:2013 ( the current version of ISO 27001) provides a set of standardized requirements for an Information Security Management System (ISMS) standard that ISO 9001 is the international specifies requirements for a quality management system (QMS) ISO/IEC 20000-1:2011 is a service management system (SMS) standard. It specifies requirements for the service provider to plan, establish, implement, operate, monitor, review, maintain and improve an SMS.
INFRASTRUCTURE
Compute Capacity is delivered with very high-density latest generation AMD EPYC Processors, each with 96 high performance cores. These processors additionally allow us to encrypt data while being processed in memory. New development on memory technologies – DDR5, delivers 1.5x superior performance over DDR4. DDR5 runs at 4,800MT/s as against 3,200MT/s of DDR4. All NVME Express Storage Architecture is designed to deliver up to 5,000,000 IOPS. More importantly, the new NVMe Disk have an MTBF of 2,000,000 hours, achieving superior uptime, along with unprecedented performance. 200GbE network delivers the required throughput for all the functions – Virtualised tenant network, back-up network & management network. Global Load-balancing allows for load-sharing between both sites. The solution is 24 x 7 fully managed infrastructure up to the operating system with optional managed services for databases.
Availability Data Center Hosted from Tier 3 Data Center facility with N+1 and N+N redundancy for all critical components Server and Storage Clustered Hypervisor farm ensuring no single point of failure Hosted Area Network Switching, Routing, UTM and Load Balancing on High Availability DR ready infrastructure DR Ready cloud, could be ‘enabled’ in case planned in future Monitoring and Reporting Monitored and managed 24 * 7 through automated SNMP/WMI/Native alerting and reporting
IDC Cloud Benefits On-demand, scalable, pay-per- use cloud services delivered on-premises, IDC’s DCs & even third-party DC Easily replicate current enterprise architecture, connects enterprise private networks and existing hardware Pay- per- use model that is 40% lower than public cloud services, over 80% savings over physical server configurations The infrastructure can grow or shrink based on business demand, allowing IT teams to match their costs to business outcomes Performance surpassing standard physical server configurations with SSD Storage. Predictable and guaranteed performance! Price Performance benchmark – Cloud Spectator Report 2015, 2016,2017 & 2018… Location Security Compliance Recovery Management Support
Managed Services Entire data center management with adaptive support and governance for operations. Backup as a Service Replication as a Service Managed Services for Platforms Windows Linux Managed Services for Database Management MySQL MsSQL Oracle Managed Services for Network Management Managed Services for Security Management – OS & Network
SECURITY SERVICES
Full portfolio of Managed Security Services Native Multi- tenancy, Customizable Centralized Management & Reporting, Extreme Performance Scalability & Platform Flexibility. Security & Device Management Threat & Vulnerability Management Security Monitoring and Auditing. Incident Response Management Compliance Management SIEM Services Security services are critical to protecting IDC’s customers in multi- tenant environments, providing centralized and consolidated cyber security incident prevention, detection and response capabilities. Identity Services
Managed Security Services
Identity and Access Management (IAM ) Controls the use of data and protects its circulation. It identifies who has the right to access the systems and data (across devices) – often with features as single sign-on and multi-factor authentication. Endpoint Protection: Endpoints are secure when IT has firm control over devices, applications and enforces data policies for removable media and devices. A remote control can remedy theft and loss of mobile devices. Data Security Data Loss Prevention (DLP) The means to identify and prevent unwanted leak or loss of data, blocking or placing content in quarantine to further protect or improve. Endpoint Security Web Protection (WAF): By securing mail and internet gateways, IT can automatically detect malware, isolate threats, and keep users off watering hole sites. SSL certificates are a popular feature preventing the interception of sensitive information from company websites. Secure File Sharing: User-driven collaboration and third-party file sharing, supporting synchronization, and distribution. Email Protection: Both in and outgoing protection prevent other than the designated receiver from accessing contents with features such as anti-spam, anti-phishing, and anti-malware. Network Monitoring & Analysis: By applying an analysis engine in combination device can evaluate suspicious objects/logs, identify concealed threats that have already penetrated, and maintain a real-time view of incoming threats. The analysis can layout vulnerabilities, diagnose, and create a roadmap for bolstering network protection. Threat Detection: To spot suspicious activities or objects engineered for invisibility, security administrators should leverage threat detection. Threats are isolated and studied, and integrated solutions can automate rollback to reverse any damage to systems or data. Next-Gen Firewalling : Intelligent differentiation between valid and compromised traffic and protection against known and unknown threats such as malware with intrusion prevention, SSL inspection, DNS, and web filtering. Threat Analysis: Anomalies and suspicious behaviour is analyzed to improve prediction and identification of threats for mitigation. Context visualization helps avoid false positives. Network Security Sandboxing: Sophisticated malware bypassing traditional security is caught and detonated in a controlled and isolated environment for analysis and increased threat protection. Cloud Security Threat Protection: Algorithms to provide automated analysis of traffic worldwide to discern between malicious and non-malicious files. Machine learning supports threat intelligence within a network by detecting suspicious activity, even if that particular exploit is unknown. VPN: Encryption of data passage to and from outside the network . SOC – Absence of Managed Security Services and Command Center Backup & Recovery: If a malicious object such as ransomware succeeds in executing, administrators also need malware rollback capabilities to keep systems and data intact. Backup encryption should be an inherent feature. Layered approach for Security
SOC (Security Operations Centre) SOC Definitions Security Operations Centre is responsible for monitoring and responding to security incidents, helping to minimize and prevent cyber attacks on an organization's assets. SOC Visibility SOC teams employ a range of tools and techniques to identify and analyze incidents and maintain the overall security posture of an organization . SOC Benefits A SOC approach allows organizations to coordinate and manage security events efficiently, ensuring attacks can be identified and resolved as quickly as possible.
SOC (SECURITY OPERATION CENTRE) Overview of SIEM : SIEM is a tool for managing and identifying security incidents and events using event logs and data from multiple sources. SIEM Functionality: SIEM tools provide a centralized point of view to help security teams investigate suspicious activity and respond proactively to threats SIEM Benefits:: SIEM enables network teams to identify suspicious activity fast, making it easier to prevent and respond to security issues. What is SOAR? SOAR platforms provide security orchestration, automation, and response capabilities to improve threat detection and response times. SOAR Platform Functionality: SOAR platforms automate repetitive security tasks that used to be performed manually, freeing up security teams to work on more critical tasks. Why SOAR is Important: By using SOAR, organizations can respond faster and more efficiently to security incidents, helping to mitigate potential risks and limit damage. SOAR SIEM UEBA User and Entity Behaviour Analytics (UEBA) security solution protects from insider threats by continuously monitoring users and endpoints with automated detection and response capabilities. Leveraging machine learning and advanced analytics, SOAR+UEBA automatically identifies non-compliant, suspicious, or anomalous behaviour and rapidly alerts any compromised user accounts.
Proposed Recommendation – Run 24x7 SOC-aaS Security Fabric + SOC- aaS Broad visibility and protection of the entire digital attack surface to better manage risk Integrated solution that reduces management complexity and shares threat intelligence Automated self-healing networks with AI-driven security for fast and efficient operations SIEM - Log Collection Detect at scales serves both NOC and SOC SOAR – Orchestration Security Orchestration Automation & Response Respond in streamlined and accelerated manner EASM – Threat Detection detect threats across servers, services and credentials, SOC-aaS – Security Operations Center Fully Managed security, monitoring Service based on multiple devices, performs alert triage, escalates confirmed threat notifications Deploy Security Fabric, SOC- aaS & 24x7 Managed Security Services Data protection is an important consideration for any organization, and is especially critical in the financial sector, where sensitive customer and financial data is involved. There are various frameworks, tools, and technologies available to help protect data from unauthorized access, disclosure, and other security threats.
Avoiding Distributed Denial of Service is difficult, since detection is difficult. Level of sophistication & complexity continues to grow. A dedicated appliance is proposed to identify normal traffic patterns, spot spikes & unusual behaviour associated with DDoS attacks. Solution offered is in-line, purpose built DDoS solution to defend against DDoS attacks. It automatically detects and stops multiple simultaneous attacks of any size before services fails, without any user intervention. Fully autonomous mitigation in less that 1 second. 230,000 parameters are monitored simultaneously to stop Zero-day attacks. 77,000,000 packets inspection per second network performance. CP flag, DNS, NTP, DTLS, QUIC direct/reflected attacks are mitigated from the first packet. 10,000 possible UDP reflection pots are monitored. Anti-DDoS
USE CASES
Election Commission of India Challenge 814 million registered voters in India, exceeding both the EU and US number of voters together. Complex Application Architecture to handle such a huge database with variability Existing Infra did not provide the agility and scalability required to support the variability of workloads Solution Pure Play Cloud CaaS and Virtual SAN , to meet the huge scalability IDC Managed Services to Monitor and Report the Resource utilization to help them for scalability
Institute of Health and Family Welfare Challenge Solution and Benefits Infrastructure for hosting voice web platform for sharing Disseminate information on various Diseases. Voice Web Platform using automatic speech recognition technologies and Text to Speech technology PSTN connectivity to a cloud, was a challenge with many cloud service providers and hence failed POCs. A very significant citizen service, Second of its kind in India, where only 22% of population are Internet users, launched from BSNL Cloud Automated speech recognition was being used to receive the user input and Text to speech was being used to relay information back to user. ITaaS with PSTN connectivity, was achieved with BSNL Cloud CPNC and DD SI Network skilled solution Toll free no:18001801104
EPFO (Employee Provident Fund Organization) About Hosting Project - The EPFO, has chosen BSNL to power their Electronic Challan cum Return (ECR) project. Automatic updation of accounts on receipt of contribution Employers can download Accounts slips for their employees easily. No paper based return to be prepared and submitted to EPFO. Instant payment confirmation to employers by SMS. No need to file returns and members can get the detailed account statements online Service Offered - Six (6) Managed Hosted Servers each with 2 CPU, 6 Cores. Additional Approx 10 TB Storage for running the ECR applications Service Delivery from Faridabad Datacentre Benefits offered to Client - By choosing BSNL for this project, EPFO has significantly reduced the overall time to market. The option of provisioning this from their own premise could have taken over 6 months. The client has been able to utilize the on- demand elasticity that Datacentres services could offer as they see a surge in activity towards the end of the month.
DC IT Infra Requirement Required Server Role vCPU RAM ( GB) Storage in GB Server 1 1 1 40 Server 2 2 2 60 Server 3 4 4 120 Server 4 6 6 180 Server 5 8 8 240 Server 6 16 16 480 MANAGED SECURITY SERVICES Security Incident and event management(SIEM) + Security orchestration automation and response(SOAR) + UEBA Identity and access management Data Loss Prevention(DLP) EDR(End point detection and response) SOC(Security operations centre): MDR(Managed detection and response) Network operations centre Ddos Protection Managed Web application firewall Security implementation and monitoring services Anti-malware/ Management NGFW(Next generation firewall) MANAGED SERVICES OS Management DB Management Backup Management PROPOSED SERVICES
Bharat Sanchar Nigam Ltd. Corporate Office Bharat Sanchar Bhavan Harish Chandra Mathur Lane Janpath, New Delhi- 110 001 Thank You!