Cyber 51 Partnership Program Presentation | Penetration Testing | Cyber Security

689 views

Published on

http://www.cyber-51.com offers Network Penetration Testing, Web Application Penetration Testing, Network & Web Application Vulnerability Assessments, Social Engineering, Patch Management, Hardening Services, IT Security Services, IT Security Training, Physical Security and any service related to Cyberspace.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
689
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
37
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Cyber 51 Partnership Program Presentation | Penetration Testing | Cyber Security

  1. 1. Penetration Testing Services Presented by Martin Voelk Co-Founder and Director For Partners
  2. 2. Agenda 1. Cyber Security Background 2. Threats and why customers need Cyber Security? 3. How Partners can expand their portfolio? 4. The Services - Network Penetration Testing - Web Application Penetration Testing - Network Vulnerability Assessment - Web Application Vulnerability Assessment - Social Engineering 5. The Operational Process
  3. 3. Cyber Security Background • IT has changed the way we live and work • Businesses and individuals rely on IT infrastructures • Cyber Crime has equally stepped up in the game Most businesses deploy the latest modern communication infrastructures such as clouds, tablets, smartphones, wireless etc. However whilst up to date on technology – they are typically not up to speed on Cyber Security.
  4. 4. Why Cyber Security? • Every day, Hackers attack both personal corporate systems Main Motives are either personal, financial or political: Theft customer details, credit card information, confidential information etc. Destruction (aka Denial of Service) competitors, rogue states, hackers in general
  5. 5. Why Cyber Security? • Why would customers would invest in a Security Audit? A. They realize the threat is real and they want to be protected before they fall victim to an attack (pro-active customers) B. They are forced by industry and/or government regulations to secure their infrastructure accordingly (i.e. PCI Compliance) C. Customers who have already fallen victim and want to be prepared for future attacks (re-active customers)
  6. 6. Partners – Why Cyber 51? • Cyber 51 follows a partner strategy • Partners can resell the full Cyber 51 portfolio to their clients • Everything can be white labeled (ie. Cyber 51 is working in the background as partner Ops) • Partner may also choose to mention a partnership between Cyber 51 and the partner. This is often beneficial when the client requires Cyber Security certifications which the partner may not have • Mutual NDAs, contractual agreements and processes ensure protection for all parties and smooth operations.
  7. 7. Partners – Why Cyber 51? Unique Selling Proposition • Company dedicated to Cyber Security only • Remote and On-Site capabilities across all continents • Services in 3 languages (English, German and Spanish) • Very competitive pricing • Fully white labeled services • Highly certified and 10 years+ experienced Consultants • Free Pre-Sales Support (white labeled) on behalf of Partner • Free Pre-Sales and Educational Webinars for Partners • Fix service capabilities (Servers, Networking, Design)
  8. 8. Partners • Most partners are IT services companies • A Penetration test can often serve as a door opener to upselling opportunities (ie. fixing the loopholes, configuring network and server equipment correctly etc.) • Flexible pricing models to ensure win-win for all parties • Partners can receive marketing materials and texts to implement in Newsletters, Websites etc.
  9. 9. Services 1. Network Penetration Test 2. Web Application Penetration Test 3. Network Vulnerability Assessment 4. Web Application Vulnerability Assessment 5. Social Engineering Full Service Portfolio at: http://www.cyber-51.com/it-security-services
  10. 10. Network Penetration Test Network Penetration Test Penetration testing or sometimes known as “ethical hacking” is a security testing service that focuses on locating flaws in your networks, infrastructure and overall architecture. Tests involve active exploitation of vulnerabilities. Steps: - Written consent of customer is obtained - Penetration Test is being performed during agreed time frames - Report is being created - Debrief with customer and report delivery is scheduled - Customer can fix the vulnerabilities (upsell opportunity)
  11. 11. Web Application Penetration Test Web Application Penetration Test More than 70% of all attacks are aimed at the Application layer. This service examines your web applications from coding and implementation flaws through to other issues like SQL injection and cross-site-scripting, involving active exploitation of vulnerabilities. Steps: - Written consent of customer is obtained - Penetration Test is being performed during agreed time frames - Report is being created - Debrief with customer and report delivery is scheduled - Customer can fix the vulnerabilities (upsell opportunity)
  12. 12. Vulnerability Assessments Network / Web Application Vulnerability Assessment This service is similar to a Penetration Test, however no active exploitation is being performed. Customer is made aware of vulnerabilities but they are not being exploited (hacked) in order to gain access. Service takes less time and is more on budget for small clients. Steps: - Written consent of customer is obtained - Vulnerability Test is being performed during agreed time frames - Report is being created - Debrief with customer and report delivery is scheduled - Customer can fix the vulnerabilities (upsell opportunity)
  13. 13. Social Engineering Social Engineering Social engineering security is a term that describes the non- technical intrusion into your business environment that relies on human interaction, often involving tricking people in order to break normal security policies. Steps: - Written consent of customer is obtained - Social Engineering is being performed during agreed dates - Report is being created - Debrief with customer and report delivery is scheduled - Customer can fix the vulnerabilities (upsell opportunity)
  14. 14. White Label Cloud Scanning Portal Cyber 360 Security Cloud Scanning Portal • No software or agent required • Scanning whole infrastructures in minutes • Comprehensive Reporting • PC/Laptop, MAC and Mobile Scanning • PCI Scanning & PAN (Credit Card) Scanning • Cloud Based Customer Portal • More info: www.cyber360security.com
  15. 15. Benefits The solution: Penetration Tests and Network Security Audits. Cyber 51 will, with the legal permission of the network owner, attack customer systems in the same way as a Hacker. By doing so, we are able to expose security holes in the systems. The benefit: The customer is made aware of any Security holes that exist which could be exploited by a hacker with malicious intent to gain unauthorized access to the customer network. In addition, Cyber 51 will prepare an action plan and, if the customer wishes, to implement closure of these holes.
  16. 16. Thank you for your time! Phone (US): +1 (888) 808 7843 info@cyber51.com www.cyber51.com

×