Your SlideShare is downloading. ×
0
Seculert presentation
Seculert presentation
Seculert presentation
Seculert presentation
Seculert presentation
Seculert presentation
Seculert presentation
Seculert presentation
Seculert presentation
Seculert presentation
Seculert presentation
Seculert presentation
Seculert presentation
Seculert presentation
Seculert presentation
Seculert presentation
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Seculert presentation

775

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
775
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
18
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Intelligence & SaaS based cyber crime defense
    Detects cyber borne malware already installed on your systems, gone undetected by your other security measures, based on pin-pointed intelligence gained directly from the hostile Botnets – with no need for any S/W nor H/W installation & integration!
  • 2.
    • Seal your domain against cyber penetration & leakage
    • 3. Identify your specific cyber adversaries in real time
    • 4. Gain accurate visibility to compromised assets
    • 5. Maximize your IT security investment & efficiencies
    • 6. Prevent business interruption
    • 7. Enjoy cloud-based security SaaS advantages
    • 8. No False Positive, no S/W and H/W installation
    Seculert'sintelligentCyberThreat Managementsolution@ a glance
    Confidential, Proprietary of Seculert, all rights reserved
    2
  • 9. Agenda
    The problem
    The challenge
    The solution
    How it works
    Key solution’s advantages
    About Seculert
    3
    Confidential, Proprietary of Seculert, all rights reserved
  • 10. The problem
    Cyber crime is ‘the new frontier’
    “3% to 5% percent of PCs in most Fortune 1000 organizations have bad clients already installed in them, and these are well-protected PC's.” – John Pescatore, Gartner
    Asymmetric battle
    Cyber-borne assaults evolve faster than respective countermeasure
    Cyber crime impact is devastating to online-based enterprises
    From business interruption to document theft, data base destruction, and reputation damages
    Traditional IT security methodologies are not enough
    Confidential, Proprietary of Seculert, all rights reserved
    4
  • 11. The challenge
    Apply dynamic cyber-specific security measures on par with the fast evolving cyber-crime technologies
    Install out-bound cyber security applications that complement and easily-integrate with existing in-bound IT security infrastructure
    Leverage investment in existing perimeter security systems, reinforcing efficiencies and avoiding ‘green field’ expenditure
    Be able to respond to evolving threats in real time
    Pin-point specific source of cyber crime events and defend against reoccurring penetration & leakage
    Customized reporting and alerts to specific organizational needs
    5
    Confidential, Proprietary of Seculert, all rights reserved
  • 12. The solution
    Intelligence-based out-bound methodology
    Cloud-based Cyber Threat Management service that minimizes business risks and potential losses by providing real-time detection of cybercrime events
    SaaS model offers optimized operation & Capex
    Seculert'spatent-pending technology detects the broadest possible array of malware threats
    Gathers & analyzes intelligence from multiple sensors
    Identifies malicious content, specific hostile servers & Botnets
    Pin-points corporate-specific attacks
    Alerts to specific organizational assets that were compromised
    6
    Confidential, Proprietary of Seculert, all rights reserved
  • 13.
    • Traditional security products & services focus on protecting the network from the perimeter inward
    • 14. Seculert focuses on incidents discovery outside the corporate network (stolen data, bots, malware)
    USAToday.com
    CBS.com
    C&C server
    The Web
    C&C server
    Antivirus, URL filtering, Proxy, IPS etc.
    Out-bound cyber threat detection
  • 15. How it works
    Instant access: To apply the service, all clients have
    to do is just enter their domains’ URLs!
    Seculert's cloud-based patent-pending cyber threat detectiontechnology requires no software nor hardware installation, enabling:
    Consolidation of
    Comprehensive coverage of broad array of cyber threats
    Round-the-clock research and information gathering
    Data unification of diverse inputs from multiple sources including respective Botnets
    Analysis of
    All types of threats including those without known signatures
    Notification of
    Real-time & detailed alerts of all cyber threat incidents
    Customized reporting
    Comprehensive, easy-to-use Security-as-a-Service dashboard
    Executive-level cyber threat trends reports
    Real-time reporting of affected corporate assets
    8
    Confidential, Proprietary of Seculert, all rights reserved
  • 16. Customized dashboard
    9
    Confidential, Proprietary of Seculert, all rights reserved
  • 17. Real time cyber threat monitoring
    10
    Confidential, Proprietary of Seculert, all rights reserved
  • 18. Criminal servers detection
    11
    Confidential, Proprietary of Seculert, all rights reserved
  • 19. Seculert – Application Programming Interface
    SeculertAPI allows customers to interact in real-time with its service and realize the risk associated with any IP address connecting to the corporate network/service
    Use cases:
    DDoS Defense
    Inflating Cloud Computing environment
    IP credibility based Access Control
    Confidential, Proprietary of Seculert, all rights reserved
    12
  • 20. Key solution’s advantages 1
    Real-time & dynamic blocking of hostile servers
    Identify & rank specific security vulnerabilities used by active hackers
    Maximized ROI:
    Enabling allocation of security budget & focus to address only specific & validated vulnerabilities and gaps
    Accurate reports of any compromised corporate assets & domains including respective offender’s identify
    Tailored & customized dashboard
    Low impact & fast service integration:
    No S/W nor H/W installation required
    Customer need only to enter their corporate domains details to create their account instantly!
    13
    Confidential, Proprietary of Seculert, all rights reserved
  • 21. Key solution’s advantages 2
    Real-time remote monitoring
    Customized reports to all stake holders:
    From executive management
    Assigned IT personnel
    Forwarding notification of criminal events to law enforcement authorities
    Real-time, dynamic & on demand vulnerabilities status report
    Avoid losing business opportunities when partners’ sites block your corporate domain if evaluated as unsafe
    14
    Confidential, Proprietary of Seculert, all rights reserved
  • 22. About Seculert
    Strong executive management team
    with proven Enterprise record
    Extensive industry-specific experience
    Check Point , RSA , M86 , Finjan, Paradigm, SanDisk , Amdocs
    Patent-pending innovative IP
    Sound financial backing
    15
    Confidential, Proprietary of Seculert, all rights reserved
  • 23. Thank you
    Confidential, Proprietary of Seculert, all rights reserved
    16

×