SlideShare a Scribd company logo
CASE STUDY

Company
Anonymous
Description
Credit Card Payment Processor
Location
Israel

OVERVIEW
Requirements
•	 Combat the latest cyber-threats
•	 Protect sensitive information
•	Ensure that internal and external networks are not
compromised
Why Seculert
•	
Automatically detects malware, zero-day attacks,
advanced and persistent threats
•	 Low TCO with no need to install hardware or software
•	 Security coverage of all company networks as well as
partners and customers connecting to the company
assets

“

We were in need of a tool that

would provide us with a 360° view
of security threats.

“

CISO
CASE STUDY

Results
•	 Full view of security threats
•	 Real-time detection and alerts using cloud-based infrastructure
•	 Uncovers threats that have bypassed other security systems
•	 No false positives due to external intelligence from live botnets
•	 A complete SaaS solution that can be setup in minutes to provide immediate results and ongoing data intelligence

THE CHALLENGE
For the CISO of the largest payment card processor in Israel, protecting sensitive data and credit card information is critical.
Not only does the payment card processor have to ensure that their corporate networks are protected from malware,
Trojans and other viruses, but they must also be certain that the thousands of employees, partners and customers constantly
communicating with their network are also uncompromised.

THE SOLUTION
Seculert is able to detect, by unique automated analysis, both advanced and persistent threats that the payment card
processor’s existing security solutions were unable to detect. Seculert finds malware that has been bypassed by existing
legacy security measures across the entire organization, including laptops, remote employees and clients connecting to the
customer’s network.
By receiving data from live botnets, Seculert identifies infection through the analysis of botnet traffic, guaranteeing no false
positives. In the event that a threat is uncovered, the payment card processor can act swiftly and decisively, in most cases
blocking the malicious elements and averting significant data and monetary losses.
“We were in need of a tool that would provide us with a 360° view of security threats,” said the CISO of the payment card
processor. “Seculert’s offering is truly unique and while there are vendors that promise a few of the services that Seculert
offers, no one else has it all.”
Seculert’s service is 100 percent cloud based delivering low total cost of ownership, with no hardware or software to install.
Due to the immediate success Seculert has had in identifying threats, the payment card processor has also recently renewed
their annual license.

About the company
One of the largest credit card payment processors in Israel.

Toll Free (US): 1-855-732-8537
Tel (US): 1-408-560-3400
Tel (UK): 44-203-355-6444
Tel (Intl): 972-3-919-3366

info@seculert.com

www.seculert.com

More Related Content

What's hot

Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threats
Zscaler
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
Guido Marchetti
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
Block Armour
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
Tripwire
 
What is zero trust model of information security?
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?
Ahmed Banafa
 
Network Security Assessment
Network Security AssessmentNetwork Security Assessment
Network Security Assessment
Rahi Systems
 
The 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for CybersecurityThe 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for Cybersecurity
nathan-axonius
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Emrah Alpa, CISSP CEH CCSK
 
Seculert presentation
Seculert presentationSeculert presentation
Seculert presentation
themarker
 
CyberObserver
CyberObserverCyberObserver
CyberObserver
Shimon Becker
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise Checklist
Jignesh Solanki
 
Zero Trust
Zero TrustZero Trust
Zero Trust
Boaz Shunami
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
Er. Ajay Sirsat
 
What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero Trust
Okta-Inc
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
Gowdhaman Jothilingam
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
AlgoSec
 
RSA ASIA 2014 - Internet of Things
RSA ASIA 2014 - Internet of Things RSA ASIA 2014 - Internet of Things
RSA ASIA 2014 - Internet of Things
Wolfgang Kandek
 
Zero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeZero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at Adobe
Vishwas Manral
 
Forrester no more chewy centers- the zero trust model
Forrester   no more chewy centers- the zero trust modelForrester   no more chewy centers- the zero trust model
Forrester no more chewy centers- the zero trust model
Cristian Garcia G.
 

What's hot (19)

Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threats
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
What is zero trust model of information security?
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?
 
Network Security Assessment
Network Security AssessmentNetwork Security Assessment
Network Security Assessment
 
The 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for CybersecurityThe 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for Cybersecurity
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
 
Seculert presentation
Seculert presentationSeculert presentation
Seculert presentation
 
CyberObserver
CyberObserverCyberObserver
CyberObserver
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise Checklist
 
Zero Trust
Zero TrustZero Trust
Zero Trust
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero Trust
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
RSA ASIA 2014 - Internet of Things
RSA ASIA 2014 - Internet of Things RSA ASIA 2014 - Internet of Things
RSA ASIA 2014 - Internet of Things
 
Zero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeZero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at Adobe
 
Forrester no more chewy centers- the zero trust model
Forrester   no more chewy centers- the zero trust modelForrester   no more chewy centers- the zero trust model
Forrester no more chewy centers- the zero trust model
 

Viewers also liked

Redes sociales
Redes socialesRedes sociales
Redes sociales
Reyna Alarcòn Flores
 
15 setiembre 2011
15 setiembre 201115 setiembre 2011
15 setiembre 2011
biblioldc
 
2011 may flemington office calendar
2011 may   flemington office calendar2011 may   flemington office calendar
2011 may flemington office calendar
Weichert, Realtors
 
Cimic Alexander
Cimic AlexanderCimic Alexander
Cimic AlexanderURIELJAN
 
Introduction To Reaction Rates Activity
Introduction To  Reaction  Rates ActivityIntroduction To  Reaction  Rates Activity
Introduction To Reaction Rates Activity
Lisa
 
Presentacio Hasnae
Presentacio HasnaePresentacio Hasnae
Presentacio Hasnae
URIELJAN
 
Graffiti fur &Thaw
Graffiti fur &ThawGraffiti fur &Thaw
Graffiti fur &Thaw又瑋 賴
 
Top 15 most wanted tools lms
Top 15 most wanted tools lmsTop 15 most wanted tools lms
Top 15 most wanted tools lms
Hamed Dehnavi
 
Aeropuertos del Táchira
Aeropuertos del TáchiraAeropuertos del Táchira
Aeropuertos del Táchira
visitatachira
 
Origrama Lalo
Origrama LaloOrigrama Lalo
Origrama Lalo
Lilia Ibarra Medrano
 
Criterios de reflexión de la práctica 2
Criterios de reflexión de la práctica 2Criterios de reflexión de la práctica 2
Criterios de reflexión de la práctica 2
ProyectosE
 
наша группа
наша группанаша группа
наша группа
lenhik
 
Diapositivas con acciones como compartir y trabajar en equipo.
Diapositivas con acciones como compartir y trabajar en equipo.Diapositivas con acciones como compartir y trabajar en equipo.
Diapositivas con acciones como compartir y trabajar en equipo.
Yolanda80
 
Cd Evaluation A2 Media
Cd Evaluation A2 MediaCd Evaluation A2 Media
Cd Evaluation A2 Media
06PCAUDY
 
Mood boards
Mood boardsMood boards
Mood boards
Adam Grundy
 
Navidadinterior - Maria Luisa Becerra
Navidadinterior - Maria Luisa BecerraNavidadinterior - Maria Luisa Becerra
Navidadinterior - Maria Luisa Becerramlbecerra
 

Viewers also liked (17)

Redes sociales
Redes socialesRedes sociales
Redes sociales
 
15 setiembre 2011
15 setiembre 201115 setiembre 2011
15 setiembre 2011
 
2011 may flemington office calendar
2011 may   flemington office calendar2011 may   flemington office calendar
2011 may flemington office calendar
 
Cimic Alexander
Cimic AlexanderCimic Alexander
Cimic Alexander
 
Introduction To Reaction Rates Activity
Introduction To  Reaction  Rates ActivityIntroduction To  Reaction  Rates Activity
Introduction To Reaction Rates Activity
 
Presentacio Hasnae
Presentacio HasnaePresentacio Hasnae
Presentacio Hasnae
 
Graffiti fur &Thaw
Graffiti fur &ThawGraffiti fur &Thaw
Graffiti fur &Thaw
 
Top 15 most wanted tools lms
Top 15 most wanted tools lmsTop 15 most wanted tools lms
Top 15 most wanted tools lms
 
Mentiras
MentirasMentiras
Mentiras
 
Aeropuertos del Táchira
Aeropuertos del TáchiraAeropuertos del Táchira
Aeropuertos del Táchira
 
Origrama Lalo
Origrama LaloOrigrama Lalo
Origrama Lalo
 
Criterios de reflexión de la práctica 2
Criterios de reflexión de la práctica 2Criterios de reflexión de la práctica 2
Criterios de reflexión de la práctica 2
 
наша группа
наша группанаша группа
наша группа
 
Diapositivas con acciones como compartir y trabajar en equipo.
Diapositivas con acciones como compartir y trabajar en equipo.Diapositivas con acciones como compartir y trabajar en equipo.
Diapositivas con acciones como compartir y trabajar en equipo.
 
Cd Evaluation A2 Media
Cd Evaluation A2 MediaCd Evaluation A2 Media
Cd Evaluation A2 Media
 
Mood boards
Mood boardsMood boards
Mood boards
 
Navidadinterior - Maria Luisa Becerra
Navidadinterior - Maria Luisa BecerraNavidadinterior - Maria Luisa Becerra
Navidadinterior - Maria Luisa Becerra
 

Similar to Cs credit card processor

Anti-Fraud Datasheet
Anti-Fraud DatasheetAnti-Fraud Datasheet
Anti-Fraud Datasheet
Mani Rai
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
EY
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
Blueliv
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
Blueliv
 
ZS Infotech v1.0
ZS Infotech v1.0ZS Infotech v1.0
ZS Infotech v1.0
Muhammad Zubair
 
SOC Service in India.pdf
SOC Service in India.pdfSOC Service in India.pdf
SOC Service in India.pdf
ACS Networks & Technologies
 
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...
Webcraftzs Technologies
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
Jim Kaplan CIA CFE
 
BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023
CBIZ, Inc.
 
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
Happiest Minds Technologies
 
Get Benefit From Threat Intelligence
Get Benefit From Threat IntelligenceGet Benefit From Threat Intelligence
Get Benefit From Threat Intelligence
SOCVault
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
Carol Meng-Shih Wang
 
Cybersecurity – a critical business issue
Cybersecurity – a critical business issueCybersecurity – a critical business issue
Cybersecurity – a critical business issue
SonaliG6
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security Analysis
CSCJournals
 
2FA Advanced Authentication for Public Safety
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety
2FA, Inc.
 
What is Zero Trust Cybersecurity?
What is Zero Trust Cybersecurity?What is Zero Trust Cybersecurity?
What is Zero Trust Cybersecurity?
Metaorange
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
Mobeen Khan
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
Frederic Roy-Gobeil, CPA, CGA, M.Tax.
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...
Erin Moore
 

Similar to Cs credit card processor (20)

Anti-Fraud Datasheet
Anti-Fraud DatasheetAnti-Fraud Datasheet
Anti-Fraud Datasheet
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
 
ZS Infotech v1.0
ZS Infotech v1.0ZS Infotech v1.0
ZS Infotech v1.0
 
SOC Service in India.pdf
SOC Service in India.pdfSOC Service in India.pdf
SOC Service in India.pdf
 
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023
 
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
 
Get Benefit From Threat Intelligence
Get Benefit From Threat IntelligenceGet Benefit From Threat Intelligence
Get Benefit From Threat Intelligence
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Cybersecurity – a critical business issue
Cybersecurity – a critical business issueCybersecurity – a critical business issue
Cybersecurity – a critical business issue
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security Analysis
 
2FA Advanced Authentication for Public Safety
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety
 
What is Zero Trust Cybersecurity?
What is Zero Trust Cybersecurity?What is Zero Trust Cybersecurity?
What is Zero Trust Cybersecurity?
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...
 

Cs credit card processor

  • 1. CASE STUDY Company Anonymous Description Credit Card Payment Processor Location Israel OVERVIEW Requirements • Combat the latest cyber-threats • Protect sensitive information • Ensure that internal and external networks are not compromised Why Seculert • Automatically detects malware, zero-day attacks, advanced and persistent threats • Low TCO with no need to install hardware or software • Security coverage of all company networks as well as partners and customers connecting to the company assets “ We were in need of a tool that would provide us with a 360° view of security threats. “ CISO
  • 2. CASE STUDY Results • Full view of security threats • Real-time detection and alerts using cloud-based infrastructure • Uncovers threats that have bypassed other security systems • No false positives due to external intelligence from live botnets • A complete SaaS solution that can be setup in minutes to provide immediate results and ongoing data intelligence THE CHALLENGE For the CISO of the largest payment card processor in Israel, protecting sensitive data and credit card information is critical. Not only does the payment card processor have to ensure that their corporate networks are protected from malware, Trojans and other viruses, but they must also be certain that the thousands of employees, partners and customers constantly communicating with their network are also uncompromised. THE SOLUTION Seculert is able to detect, by unique automated analysis, both advanced and persistent threats that the payment card processor’s existing security solutions were unable to detect. Seculert finds malware that has been bypassed by existing legacy security measures across the entire organization, including laptops, remote employees and clients connecting to the customer’s network. By receiving data from live botnets, Seculert identifies infection through the analysis of botnet traffic, guaranteeing no false positives. In the event that a threat is uncovered, the payment card processor can act swiftly and decisively, in most cases blocking the malicious elements and averting significant data and monetary losses. “We were in need of a tool that would provide us with a 360° view of security threats,” said the CISO of the payment card processor. “Seculert’s offering is truly unique and while there are vendors that promise a few of the services that Seculert offers, no one else has it all.” Seculert’s service is 100 percent cloud based delivering low total cost of ownership, with no hardware or software to install. Due to the immediate success Seculert has had in identifying threats, the payment card processor has also recently renewed their annual license. About the company One of the largest credit card payment processors in Israel. Toll Free (US): 1-855-732-8537 Tel (US): 1-408-560-3400 Tel (UK): 44-203-355-6444 Tel (Intl): 972-3-919-3366 info@seculert.com www.seculert.com