2. Powerful Network Security
2 | 2016 threatSHIELD Security All Rights Reserved
Automates policy enforcement on existing network
in real time.
Custom, flexible policy creation supports your
security requirements.
Automatically blocks attacks and prevents data
theft and corruption.
Simplifies management with single point of
control for existing devices, in multiple locations
from different manufacturers.
Every threatSHIELD
Security trial has
blocked previously
undetected malware
that bypassed all other
security tools
We can show you what your firewall and Anti-Virus cannot see or detect!
3. About threatSHIELD Security
TSS is a network security
company making threat
intelligence actionable in real time
• Protects all devices on the network
• Blocks malicious inbound and outbound
traffic to neutralize malware
500+ customers
Unique Appliance & technology
enables existing network devices
to protect against the latest
security threats
Department of Homeland
Security/FBI/Isareli Army
"Driven by Intelligence!
Seasoned management team
with deep expertise in security
and DNS
Partnerships with leading
firewall, router and DNS
server vendors
3 | 2016 threatSHIELD Security All Rights Reserved
4. Proactive Defense
Blocks Malicious Traffic at Firewall, Router and DNS Server
Inbound:
• Blocks malicious
attacks: botnets,
spam, DDoS,
phishing, scanners
• Reduces network load
Outbound:
• Stops data theft,
malware, phishing,
exploit kits
• Blocks communications
with threat actors
Prevent Protect
4 | 2016 threatSHIELD Security All Rights Reserved
Imagine if we can stop Malware and Threats before the get into your network!
5. The threatSHIELD Security Difference
5 | 2016 threatSHIELD Security All Rights Reserved
Customize
Set policy based
on security
posture
Automate
Block inbound
attacks and data
theft
Simplify
Bolster security
using existing
network devices
1. Custom Appliance that will feed intelligence to your network every 30 minutes, and not found on Stores.
2. Twelve Layers Unique Approach, which reduces drastically the threats to your organization.
3. Superior Intelligence to protect your organization every day, non-stop.
6. Categorize threats Automatically update
Threat Intelligence without Complexity
Threat
IntelligenceVendors
Block
attacks and prevent
data theft and
corruption. Materially
reduces network
load.Report
on blocked attacks
and affected internal
machines to speed
remediation.
Create
tailored policies
leveraging real time
threat intelligence
to protect your
network.
Curate
intelligence data from
top sources in
security community
and trust groups;
integrate with
proprietary data.
6 | 2016 threatSHIELD Security All Rights Reserved
Cross-correlate Data
We Feed Intelligence to your network every 30 minutes!
Send logs
Detect Abnormal Patterns And Behaviors!
7. threatSHIELD Security Shield Solutions
threatSHIELD SecurityTSS Service
Key
Features
• Inbound & outbound protection
• Block based on Intelligence, not signatures
• Improves network performance
• Virtually no overhead
• Makes networks “invisible” to
cybercriminals
• Granular outbound threat protection
• Able to block a single bad domain
on an IP address hosting thousands
of legitimate domains
• Greater flexibility in response
(Redirection)
• Enables better user experience
& training
Partners &
Supported Devices
• Leverages market-leading threat intelligence
• Protection based on user defined policies
• Automatically updates to ensure up-to-date protection
• Requires no additional hardware
7 | 2016 threatSHIELD Security All Rights Reserved
• Detect Abnormal Patterns & Behaviours
8. What We Don’t Do
Redesign Your Network
• threatSHIELD Security runs using your existing
network
Redirect Your Traffic
• Existing firewalls and routers do the enforcing
Tear Apart Traffic
• threatSHIELD Security only looks at header
information
False Positives
• TSS’s Rapid Updates and correlation engine scrubs
and filters data
8 | 2016 threatSHIELD Security All Rights Reserved
9. Simple to deploy and manage
• Uses existing network: no infrastructure upgrade required
• Leverages existing firewalls and routers for enforcement
• Powerful reporting identifies areas for remediation reducing analyst workload
Significantly reduces network traffic
• Reduces bandwidth and infrastructure requirements; saves money
• Fewer alerts, so security team can focus on legitimate threats
Improves productivity for IT staff and end users
• Reduces help desk calls
• Less downtime for employees and their machines
• Fewer machines require reimaging
Value of threatSHIELD Security: ROI
9 | 2016 ThreatSTOP All Rights Reserved
20%
Reduction
in Traffic
$3.8M
Average Cost
of Breach
Tremendous Yearly Savings on Security Equipment that is Failing to Detect Invisible Process!