Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cognitive Security - Corporate Introduction ('12)

2,872 views

Published on

Download the original PowerPoint version here: http://gdusil.wordpress.com/2012/06/30/cose-corporate-introduction/
Check out my blog "Multiscreen & OTT for the Digital Generation" @ gdusil.wordpress.com.

Corporate leaders face complex challenges in balancing security spending against the evolving risks that internet commerce presents. This has resulted in new and advanced levels of protection needed to facilitate these strategic objectives. Expert Security addresses the need to implement more robust and cost effective levels of expertise, and also helps to bridge the gap to higher, and more expensive - and often culturally adverse - outsourced solutions. As companies expand, their need for additional layers of protection it is paramount to ensure asset protection. Network Behavior Analysis are the building blocks of Expert Security, and offers a viable solution to modern sophisticated cyber-attacks. This presentation was prepared to outline our corporate overview and market positioning of Cognitive Security.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Cognitive Security - Corporate Introduction ('12)

  1. 1. Gabriel DusilVP, Global Sales & Marketing www.facebook.com/gdusil cz.linkedin.com/in/gabrieldusil gdusil.wordpress.com dusilg@gmail.com
  2. 2. Origins Research began in 2006 Company established in 2009 Funded by U.S. Army, Navy & Air ForceExperts in Network Behavior AnalysisMission Providing detailed intelligence to detect modern sophisticated network attacksHeadquarters Security Prague, Czech Republic & Silicon Valley, CA Innovation Experts in Network Behavior Analysis Page 2, www.cognitive-security.com © 2012, gdusil.wordpress.com
  3. 3. Point of Entry  Compromise Compromise  Discovery  50% attacks take days to   70% of victims allow a breach to months of reconnaissance for a persist for weeks to months before successful breach detecting a compromise Experts in Network Behavior Analysis Page 3, www.cognitive-security.com Verizon – ‘11 Data Breach Investigations Report © 2012, gdusil.wordpress.com
  4. 4. • Managed Security Services • Security Monitoring & Management• Network Behavior Analysis• Anomaly Detection • Web Security, Content Filtering • SIEM • Web-Application Firewalls • IDS & IPS • Vulnerability Management • IAM• Firewalls • Email Security• Anti-Virus • VPN (SSL & IPsec) SIEM = Security Information & Event Management) IDS & IPS = Intrusion Detection & Prevention System AAA = Authentication, Authorization, & Accounting Experts in Network Behavior Analysis IAM = Identity & Access Management Page 4, www.cognitive-security.com VPN = Virtual Private Network, SSL = Secure Sockets Layer © 2012, gdusil.wordpress.com
  5. 5. Security as a Service Network APT, Zero-Day, Exploit Kits Behavior & Polymorphic malware… Analysis Attack Patterns IDS & IPS malware, etc. Web Securityemail Security Filtering, XXS SQL Inj., etc. Firewall Virus, Trojans,Network Behavior Analysis Span, etc. Cost effective Expert Security for Footprint enterprises, telcos & governments reduction, Important security layer & a higher scripts, etc. wall for modern-day protection Experts in Network Behavior Analysis Page 5, www.cognitive-security.com © 2012, gdusil.wordpress.com
  6. 6. Experts in Network Behavior AnalysisPage 6, www.cognitive-security.com© 2012, gdusil.wordpress.com
  7. 7. Cost Effective & Robust Network Behavior Analysis forCognitive Analyst Enterprise High Throughput Traffic Volumes - Telco, Mobile, ISP & NSP High Resolution & Attack sensitivity - custom for Governments Experts in Network Behavior Analysis Page 7, www.cognitive-security.com © 2012, gdusil.wordpress.com
  8. 8. Monitoring Awareness, Employees,Corporate Governance 4% Patching, 7% Device or Network Misconfig 21% IAM, 11% Restricted Apps, Policy Violations Log Anal., 8% Audits, 8% Irregular Behavior & Misuse Vulnerability Analysis, 10% Malware Analysis, 14%Diagnostics Support Incident Response, Vulnerability & Pen-testing 12% Threat Research, Forensics Analysis 8% Incident & Response Responsibilities of a Security AdministratorAdvanced Cyber-Attacks Trojans, Botnets, C2 & Exploit Kits Modern Sophisticated Attacks Spyware & Info leaks  Advanced Persistent Threats Brute Force & Insider Attacks  Reconnaissance & Sabotage Denial of Service (DoS) Polymorphic Malware  Zero-Day Attacks Experts in Network Behavior Analysis Page 8, www.cognitive-security.com Information Week - Strategic Security Survey 11 © 2012, gdusil.wordpress.com
  9. 9. Experts in Network Behavior AnalysisPage 9, www.cognitive-security.com© 2012, gdusil.wordpress.com
  10. 10. Experts in Network Behavior AnalysisPage 10, www.cognitive-security.com© 2012, gdusil.wordpress.com
  11. 11. Experts in Network Behavior AnalysisPage 11, www.cognitive-security.com© 2012, gdusil.wordpress.com
  12. 12. Heavy DNS Use & SophisticatedUnclassified Scans Periodic Behavior - PollingUnexpected - Command Anomaly & ControlPeer 2 Peer Unexpected Network new service Behavior or Outlier Outbound Client Encrypted sessions (eg. SSH) Experts in Network Behavior Analysis Page 12, www.cognitive-security.com © 2012, gdusil.wordpress.com
  13. 13. No Signatures! Artificial Intelligence No Signature limitations  Strength of 8 Detection Algorithms Attackers will exploit: • Highly Accurate Attack detection • Delays in writing signatures  Peer-Reviewed Algorithms • Delay to install new signatures • Tested by the scientific community • Clients ignoring updates due to resource constraints  Long-Duration Trust Modeling • Analyzing current behavior against past assessments  Unique Self-configuration • Challenge Agents ensures system is operational  Hacker Circumvention Resistance • Game Theory optimization ensures system behavior is not predicable  State-of-the-art Auto-TuningCost Competitive • Minimal deployment resources Cost effective Expert Security needed Experts in Network Behavior Analysis Page 13, www.cognitive-security.com © 2012, gdusil.wordpress.com
  14. 14. Experts in Network Behavior AnalysisPage 14, www.cognitive-security.com© 2012, gdusil.wordpress.com
  15. 15. Experts in Network Behavior AnalysisPage 15, www.cognitive-security.com© 2012, gdusil.wordpress.com
  16. 16. Cognitive Analyst classifiestrustfulness of data,then is separatedfromThen further separated into… assessed into over event categories, & into severity levels which can not be immediately classified Experts in Network Behavior Analysis Page 16, www.cognitive-security.com © 2012, gdusil.wordpress.com
  17. 17. Comparing Near real-time data to the pastSeverity 8  Historical threat data is incorporated to detect sophisticated attacks Unclassified Using the most sophisticated Normal self-learning techniques in the Security Industry today  Using 8 independent Anomaly Detection Algorithms Aggregating multiple threat sources into clusters Experts in Network Behavior Analysis Page 17, www.cognitive-security.com © 2012, gdusil.wordpress.com
  18. 18. Al1 → 0.7 TM1 → 0.5 Al2 → 0.2 Al3 → 0.9Network Traffic TM2 → 0.7 Al4 → 0.4 CTS→ 0.7 Al5→ 0.3 TM3 → 0.4 Cognitive Al6 → 0.2 Trust Score Al7 → 0.4 TM4 → 0.6 . . Al8 → 0.5 . Detection Trust Knowledge Algorithms Modeling Fusion Unclassified Behavior Trustfulness Event Severity Assessment Generation Assignment Layer Layer Layer Experts in Network Behavior Analysis Page 18, www.cognitive-security.com CTS = Cognitive Trust Score © 2012, gdusil.wordpress.com
  19. 19. (hh:mm) Start System connected to Self-Initialization network data source 2 Algorithms 3 Algorithms all Algorithms Knowledge Online Fusion - active Self-Configuration Self-Optimization Artificial Intelligence • Continually tunes to the client’s environment • Highly accurate by combining  Scalable Architecture several advanced algorithms • Decentralized & Distributed Auto-Learning Engine • Parallel Processing for attack • Self-Optimizing detection in high speed networks Experts in Network Behavior Analysis Page 19, www.cognitive-security.com © 2012, gdusil.wordpress.com
  20. 20. Experts in Network Behavior AnalysisPage 20, www.cognitive-security.com© 2012, gdusil.wordpress.com
  21. 21. Pharma Chemical Mobile Defence Defence Energy, Oil&Gas ISP & NSP Intelligence Finance Manufacturing Hosting UtilitiesDowntime Sabotage Tarnished Image Lost Productivity Terrorism Theft of Corporate Secrets Fraud Government Sponsored Attacks Detecting Modern Sophisticated Attacks Attack Forensics Advanced Threat Diagnostics Security Monitoring Services Behavior Monitoring Bronze Silver Gold Platinum Expert Services Consulting Training Forensics R&D Software Development Research Cognitive1 Cognitive10 CognitiveExpert Distribution Appliance VM or ISO Image Software Experts in Network Behavior Analysis Page 21, www.cognitive-security.com © 2012, gdusil.wordpress.com
  22. 22. Experts in Network Behavior AnalysisPage 22, www.cognitive-security.com© 2012, gdusil.wordpress.com
  23. 23. Security Innovation Product Reliability Delivering Forward-thinking  5th Generation Network Behavior Security Solutions Analysis platform Thought Leadership Privacy ConcernsR&D Expertise  Data anonymity is maintained Cost-effective Research & Development resources Quick development turn-around Flexible integration with OEMs, MSSPs, & device manufacturersIntuitive Management Interface Easy-to-Use Dashboard Granular attack detection analysis Experts in Network Behavior Analysis Page 23, www.cognitive-security.com © 2012, gdusil.wordpress.com
  24. 24. http://gdusil.wordpress.com/2013/03/08/cognitive-secu…ntroduction-12/ Experts in Network Behavior Analysis Page 24, www.cognitive-security.com © 2012, gdusil.wordpress.com
  25. 25. Experts in Network Behavior AnalysisPage 25, www.cognitive-security.com© 2012, gdusil.wordpress.com
  26. 26. • Corporate leaders face complex challenges in balancing security spending against the evolving risks that internet commerce presents. This has resulted in new and advanced levels of protection needed to facilitate these strategic objectives. Expert Security addresses the need to implement more robust and cost effective levels of expertise, and also helps to bridge the gap to higher, and more expensive - and often culturally adverse - outsourced solutions. As companies expand, their need for additional layers of protection it is paramount to ensure asset protection. Network Behavior Analysis are the building blocks of Expert Security, and offers a viable solution to modern sophisticated cyber-attacks. This presentation was prepared to outline our corporate overview and market positioning of Cognitive Security. Experts in Network Behavior Analysis Page 26, www.cognitive-security.com © 2012, gdusil.wordpress.com
  27. 27. Network Behavior Analysis, NBA, Cyber Attacks, Forensics Analysis,Normal vs. Abnormal Behavior, Anomaly Detection, NetFlow, IncidentResponse, Security as a Service, SaaS, Managed Security Services,MSS, Monitoring & Management, Advanced Persistent Threats, APT,Zero-Day attacks, Zero Day attacks, polymorphic malware, ModernSophisticated Attacks, MSA, Non-Signature Detection, ArtificialIntelligence, A.I., AI, Security Innovation, Mobile security, CognitiveSecurity, Cognitive Analyst, Forensics analysis Experts in Network Behavior Analysis Page 27, www.cognitive-security.com © 2012, gdusil.wordpress.com

×