BRAND POINT PROTECTION:
ONLINE BRAND PROTECTION
Group-IB
Main activities:
 ONE OF THE LEADING INTERNATIONAL
COMPANIES THAT SPECIALIZE ON
PREVENTION AND INVESTIGATION OF
...
CERT-GIB
computer
security incident
response team
1 2 3 4
 The first 24/7 CERT in
Eastern Europe
 Transcontinental suppo...
GROUP-IB’S
EXPANSION PHASES
GROUP-IB
CREATED
2003 2009 2010 2011 2014
ENTERS THE INTERNATIONAL
MARKET
BECOMES THE LARGEST
...
5
 Mobile App Monitoring
4 5
 Anticounterfeiting
1
 Antiphishing  Antipiracy  Protection of
business reputation
2 3
B...
Online threats
to brands
6
 A brand is a set of information about a company,
product or service; it is a popular, easily
...
Antiphishing
7
 Monitoring, detection and notification of
incidents of phishing and other cases of online
brand abuse.
 ...
Protection of
business reputation
8
 A package of countermeasures against online
spread of false or defamatory informatio...
Anti-piracy
9
 A package of countermeasures against illegal
distribution of digital content and other intellectual
proper...
Mobile App Monitoring
10
 A solution for identifying and responding to
cases of appearance of a software product on
mobil...
Anticounterfeiting
11
 Finding and identifying the sources and
distribution channels of counterfeit goods on
the Internet...
Benefits
4
 Increased trust in
the brand
1
 Increased market
value for your company
By managing the security
and volume ...
Our customers
Financial sector Energy, industry, IT
13
www.group-ib.com info@group-ib.com
14
facebook.com/groupib twitter.com/groupib
youtube.com/groupib linkedin.com/company/gr...
Upcoming SlideShare
Loading in...5
×

BrandPointProtection

534

Published on

Published in: Marketing, Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
534
On Slideshare
0
From Embeds
0
Number of Embeds
7
Actions
Shares
0
Downloads
12
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

BrandPointProtection

  1. 1. BRAND POINT PROTECTION: ONLINE BRAND PROTECTION
  2. 2. Group-IB Main activities:  ONE OF THE LEADING INTERNATIONAL COMPANIES THAT SPECIALIZE ON PREVENTION AND INVESTIGATION OF CYBER CRIMES AND HIGH-TECH FRAUD 3 4 5  Computer forensics and cyber crime investigation  Information security audit and security analysis  Development of innovative information security products 2  Cyber Intelligence, monitoring and prevention of cyber threats 2 1  Brand protection and Anti-piracy
  3. 3. CERT-GIB computer security incident response team 1 2 3 4  The first 24/7 CERT in Eastern Europe  Transcontinental support  Countermeasures against the following types of threats :  .RU, .РФ, .SU: a competent organization on combating cyber threats NEW YORK SINGAPORE MOSCOW CERT-GIB is the first round-the-clock computer security incident response team in Eastern Europe Monitoring and response groups are present in different parts of the globe : North America  Europe  Asia Phishing, spam, DDoS attacks, malware, botnets An expert organization of the Coordination Center for TLD RU/РФ 3
  4. 4. GROUP-IB’S EXPANSION PHASES GROUP-IB CREATED 2003 2009 2010 2011 2014 ENTERS THE INTERNATIONAL MARKET BECOMES THE LARGEST COMPUTER FORENSICS LABORATORY IN EASTERN EUROPE CERT-GIB CREATED BECOMES AN ORGANIZATION WITH UNIQUE COMPETENCIES 20+ 30+ 100+ EMPLOYEES 4
  5. 5. 5  Mobile App Monitoring 4 5  Anticounterfeiting 1  Antiphishing  Antipiracy  Protection of business reputation 2 3 BRAND POINT PROTECTION  An efficient solution for round-the-clock monitoring, notification and response to incidents of online brand abuse
  6. 6. Online threats to brands 6  A brand is a set of information about a company, product or service; it is a popular, easily recognizable and legally protected symbol of a particular manufacturer or product  Black PR and unfair competition 41  Phishing and other fraud  Illegal distribution of digital content 2  Distribution of counterfeit and adulterated products 3 5  Dissemination of confidential information
  7. 7. Antiphishing 7  Monitoring, detection and notification of incidents of phishing and other cases of online brand abuse.  Monitoring the Internet by keywords and images for the presence of fraudulent sites 1  Investigating sites found for fraud 2  Removing fraudulent sites from direct and public access on the Internet 3
  8. 8. Protection of business reputation 8  A package of countermeasures against online spread of false or defamatory information undermining the reputation and image of a company and its employees.  Information space audit, search for information related to an entity whose reputation is at stake 1  Creation of thematic trends in search engines by creating tips for search strings with subsequent progress on selected search queries 2  Creation and placement of thematic materials (press releases, news) on information resources to fill search queries 3
  9. 9. Anti-piracy 9  A package of countermeasures against illegal distribution of digital content and other intellectual property on the Internet.  Searching for sources of illegal distribution of digital content using regular expressions 1  Preparing and sending legal notices to administrators of violating sites 2  Automatic removal (moderation) of sources of illegal distribution of digital content from largest resources immediately after being detected by the system 3  Continuous analysis of response to legal notices sent in order to further adjust the strategy of interacting with specific resources 4
  10. 10. Mobile App Monitoring 10  A solution for identifying and responding to cases of appearance of a software product on mobile app stores, which infringes intellectual property rights and designed to steal personal data.  Notifying the customer about detected rogue applications, followed up by presentation of a report concerning the developer, number of downloads and a description of the fraud scheme 2  Monitoring online shops selling applications for IOS, Android, BlackBerry, and Windows Phone 1  Immediate removal of rogue apps from public sources. 3
  11. 11. Anticounterfeiting 11  Finding and identifying the sources and distribution channels of counterfeit goods on the Internet in order to stop such illegal activities.  Gathering information about the people and companies directly involved in the distribution of counterfeit goods on the Internet  Documentation of violations involving online distribution of counterfeit goods  Implementation of legal and technical measures aimed at checking the distribution of counterfeit goods and online brand abuse 1 2 3
  12. 12. Benefits 4  Increased trust in the brand 1  Increased market value for your company By managing the security and volume of your company’s intangible assets, such as copyrights, know-how, trademarks, and business reputation Timely detection of brand abuse and notification to ensure the safety of your brands. 2  Increased sales revenues Interruption of cash flows to attackers’ projects. Removal of sources of illegal distribution of counterfeit goods and confidential information 3  Improved business reputation Wiping out false and negative reviews undermining your company’s business reputation from search queries 5  Compensation for damages caused Prosecuting the criminals abusing your brand 12
  13. 13. Our customers Financial sector Energy, industry, IT 13
  14. 14. www.group-ib.com info@group-ib.com 14 facebook.com/groupib twitter.com/groupib youtube.com/groupib linkedin.com/company/group-ib +1 253 243-31-38
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×