Trust It Mini Public

548 views
510 views

Published on

Take a look at Trust-IT\'s Company Profile and Services

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
548
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Trust It Mini Public

  1. 1. Presentation<br />Intelligence<br />Ethical Hacking<br />IT Security<br />Network Security<br />Espionage<br />Hackers<br />Terrorism<br />
  2. 2. The Company<br />TRUST-IT is an Enterprise Security Provider<br />
  3. 3. IT Security Intelligence<br />
  4. 4. Cyber Espionage Example<br />- Hacker<br />- Disgruntled Employee<br />- External Partner<br />Manufacturer<br />Data Leakage<br />Service Disruption<br />Patent Stealing<br />Cyber Espionage<br />Financial Info<br />
  5. 5. TRUST-IT’S Services<br />Information Security <br />Services (ISS)<br />Computer Forensics <br />Services (CFS)<br />Secure Integration <br />Services (SIS)<br />Consulting & Security <br />Strategy (CSS)<br />
  6. 6. Information Security Services (ISS)<br />Network Penetration Test<br />Wireless Penetration Test<br />Network Security<br /> Assessments<br />TRUST-IT<br />ISS<br />Voip Penetration Test<br />Social Engineering<br />Web app Penetration Test<br />Vulnerability Scanning<br />Source Code Analysis<br />
  7. 7. Information Security Services (Schema) <br />IT Infrastructure<br />Network Penetration Test<br />Penetration Testers<br />Wireless Penetration Test<br />Voip Penetration Test<br />Web App Penetration Test<br />Source Code Analysis<br />Vulnerability Scanning<br />Social Engineering<br />Network Security Assessments<br />
  8. 8. Hacking Blackberry Computer System<br />Central Server<br />Hacker<br />Privatecomputer<br />Eavesdrop Conversations<br />Steal Corporate Data<br />Cyber Espionage<br />Blackberry Owner<br />
  9. 9. Secure Integration Services (SIS)<br />Network Security<br />Secure Implementation<br />Application Security<br /><ul><li>Directory Services
  10. 10. Log Management & Reporting
  11. 11. Identity and Access Management
  12. 12. VOIP Security
  13. 13. Network IPS/IDS
  14. 14. Network Firewall(s)
  15. 15. Network Admission Control
  16. 16. VPN
  17. 17. Endpoint Security
  18. 18. DLP
  19. 19. Wireless Network Security
  20. 20. Email Security
  21. 21. Application Firewall
  22. 22. Web Content Security
  23. 23. Web Application Firewall</li></li></ul><li>Secure Integration Services (Schema)<br />Secure Implementation<br />Network Security<br />Application Security<br />+<br />+<br />=<br />Infrastructure<br />Secure<br />
  24. 24. Web Hacking – Hijack Airplane<br />Hacker<br />Control Tower<br />Hijack and Change Direction of an Airplane<br />Hijack and Crash the Plane<br />
  25. 25. Computer Forensics Services (CFS)<br />Cyber Crime<br />Computer Fraud<br />Data Recovery<br />Expert Witness <br />Incident Response<br />E-Discovery<br />
  26. 26. Computer Forensics Services (Schema)<br />Trust-IT’s Engineers<br />Report:<br /><ul><li>Results
  27. 27. Solutions</li></ul>Find Evidence of Computer Crime<br />Recover Lost Files<br />Respond in Cyber attacks<br />Provide Evidence in Court<br />
  28. 28. ATM Hacking Example<br />Privatecomputer<br />Hacker<br />Steal Money from Client’s Account<br />Steal Pin<br />Clone ATM Card<br />
  29. 29. Consulting & Security Strategy<br />Protect your business reputation<br />Create Security Policy for your business <br />Maximize return on security investment<br />Reduce security costs and associated risks<br />
  30. 30. Corporate Data Stolen Example<br />Sample Hacker Attacks<br />Password Leakage<br />Vulnerable Infrastructure<br />Social Engineering<br />Phishing Attacks<br />Hacker<br />Spying Employee<br />Company<br />Data Leakage – Confidential Info<br />Destroy Business Functionality/Reputation<br />Lose Client’s Data<br />Sell To Competitors<br />
  31. 31. Customers<br />Sectors in which TRUST-IT has accomplished numerous works:<br />Industrial Companies<br />Shipping Companies<br />Telecommunication Industries<br />European Telecommunication Companies<br />European ISP Providers<br />Commercial Companies<br />Multinational Group of Chemical & Pharmaceutical Companies<br />Banks - Financial Organizations<br />Public Sector<br />Airline Companies<br />
  32. 32. Wonder about…<br />How vulnerable is your network to external threats?<br />How exposed is your system to hackers?<br />How secure are your corporate data?<br />How do you respond in cyber attacks?<br />
  33. 33. Today’s Proposal- FEHA<br />
  34. 34. FEHA Procedure<br />3. Simulated Ethical Hacking Attack<br />1. Request<br />2. Confidentiality <br />Agreement<br />4. Results Report – <br />Recommendations <br />
  35. 35. FEHA - Attack Plan<br />Target Company<br />Successful- Gain Network Control<br />Rapid FEHA Network Attack<br />Attacks<br />Rapid FEHA Client-Side Attack<br />Rapid FEHA Web Application Attack<br />Ethical Hacker<br />Unsuccessful- Unable to gain Network Control<br />
  36. 36. Trust-IT – Your Security Partner<br />We can secure your IT Infrastructure from internal & external threats <br />Promote your business to the next level – Secure Operations<br />
  37. 37. OR… Let Hackers Do The Talking!<br />
  38. 38. Thank You For Your Time<br />

×