BrandPointProtection

  • 366 views
Uploaded on

 

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
366
On Slideshare
0
From Embeds
0
Number of Embeds
7

Actions

Shares
Downloads
7
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. BRAND POINT PROTECTION: ONLINE BRAND PROTECTION
  • 2. Group-IB Main activities:  ONE OF THE LEADING INTERNATIONAL COMPANIES THAT SPECIALIZE ON PREVENTION AND INVESTIGATION OF CYBER CRIMES AND HIGH-TECH FRAUD 3 4 5  Computer forensics and cyber crime investigation  Information security audit and security analysis  Development of innovative information security products 2  Cyber Intelligence, monitoring and prevention of cyber threats 2 1  Brand protection and Anti-piracy
  • 3. CERT-GIB computer security incident response team 1 2 3 4  The first 24/7 CERT in Eastern Europe  Transcontinental support  Countermeasures against the following types of threats :  .RU, .РФ, .SU: a competent organization on combating cyber threats NEW YORK SINGAPORE MOSCOW CERT-GIB is the first round-the-clock computer security incident response team in Eastern Europe Monitoring and response groups are present in different parts of the globe : North America  Europe  Asia Phishing, spam, DDoS attacks, malware, botnets An expert organization of the Coordination Center for TLD RU/РФ 3
  • 4. GROUP-IB’S EXPANSION PHASES GROUP-IB CREATED 2003 2009 2010 2011 2014 ENTERS THE INTERNATIONAL MARKET BECOMES THE LARGEST COMPUTER FORENSICS LABORATORY IN EASTERN EUROPE CERT-GIB CREATED BECOMES AN ORGANIZATION WITH UNIQUE COMPETENCIES 20+ 30+ 100+ EMPLOYEES 4
  • 5. 5  Mobile App Monitoring 4 5  Anticounterfeiting 1  Antiphishing  Antipiracy  Protection of business reputation 2 3 BRAND POINT PROTECTION  An efficient solution for round-the-clock monitoring, notification and response to incidents of online brand abuse
  • 6. Online threats to brands 6  A brand is a set of information about a company, product or service; it is a popular, easily recognizable and legally protected symbol of a particular manufacturer or product  Black PR and unfair competition 41  Phishing and other fraud  Illegal distribution of digital content 2  Distribution of counterfeit and adulterated products 3 5  Dissemination of confidential information
  • 7. Antiphishing 7  Monitoring, detection and notification of incidents of phishing and other cases of online brand abuse.  Monitoring the Internet by keywords and images for the presence of fraudulent sites 1  Investigating sites found for fraud 2  Removing fraudulent sites from direct and public access on the Internet 3
  • 8. Protection of business reputation 8  A package of countermeasures against online spread of false or defamatory information undermining the reputation and image of a company and its employees.  Information space audit, search for information related to an entity whose reputation is at stake 1  Creation of thematic trends in search engines by creating tips for search strings with subsequent progress on selected search queries 2  Creation and placement of thematic materials (press releases, news) on information resources to fill search queries 3
  • 9. Anti-piracy 9  A package of countermeasures against illegal distribution of digital content and other intellectual property on the Internet.  Searching for sources of illegal distribution of digital content using regular expressions 1  Preparing and sending legal notices to administrators of violating sites 2  Automatic removal (moderation) of sources of illegal distribution of digital content from largest resources immediately after being detected by the system 3  Continuous analysis of response to legal notices sent in order to further adjust the strategy of interacting with specific resources 4
  • 10. Mobile App Monitoring 10  A solution for identifying and responding to cases of appearance of a software product on mobile app stores, which infringes intellectual property rights and designed to steal personal data.  Notifying the customer about detected rogue applications, followed up by presentation of a report concerning the developer, number of downloads and a description of the fraud scheme 2  Monitoring online shops selling applications for IOS, Android, BlackBerry, and Windows Phone 1  Immediate removal of rogue apps from public sources. 3
  • 11. Anticounterfeiting 11  Finding and identifying the sources and distribution channels of counterfeit goods on the Internet in order to stop such illegal activities.  Gathering information about the people and companies directly involved in the distribution of counterfeit goods on the Internet  Documentation of violations involving online distribution of counterfeit goods  Implementation of legal and technical measures aimed at checking the distribution of counterfeit goods and online brand abuse 1 2 3
  • 12. Benefits 4  Increased trust in the brand 1  Increased market value for your company By managing the security and volume of your company’s intangible assets, such as copyrights, know-how, trademarks, and business reputation Timely detection of brand abuse and notification to ensure the safety of your brands. 2  Increased sales revenues Interruption of cash flows to attackers’ projects. Removal of sources of illegal distribution of counterfeit goods and confidential information 3  Improved business reputation Wiping out false and negative reviews undermining your company’s business reputation from search queries 5  Compensation for damages caused Prosecuting the criminals abusing your brand 12
  • 13. Our customers Financial sector Energy, industry, IT 13
  • 14. www.group-ib.com info@group-ib.com 14 facebook.com/groupib twitter.com/groupib youtube.com/groupib linkedin.com/company/group-ib +1 253 243-31-38