SlideShare a Scribd company logo
Honeypots & Honeynets
Tech Talk
June’13
Rasool Kareem Irfan | @rasoolirfan
Agenda
1. Preface
2. Value of Honeypot – What & Why
3. Benefits of deploying Honeypot
4. Types – Advantages & Disadvantages
5. Honeynets
• Concept
• Threat and Trends
• Architecture
6. Cyber Security Market
7. Questions
2
The Problem
Preface
 Hacker/ Intruder/ Attacker
 The security state of internet is
poor
 Anyone is the target..!
 Tools getting better
 Why do they attack?
3
Lionel Giles once said:
“Everybody can see superficially how a
battle is won; what they cannot see are the long series of
plans and combinations which have preceded the battle”
Evidence
What is Honeypot
Value of Honeypot
• Abstract definition:
• “A honeypot is an
information system resource
whose value lies in unauthorized
or illicit use of that resource.”
(Lance Spitzner)
• Concrete definition:
• “A honeypot is a fictitious
vulnerable IT system used for the
purpose of being attacked,
probed, exploited and
compromised.”
6
Their Value
• Primary value of honeypots is to collect information.
• This information is then used to better identify, understand and protect against threats.
• Honeypots add little direct value to protect your network
Why Honeypot
Value of Honeypot
• A great deal of the security profession (and the IT world)
depend honeypots, however few know it. Honeypots …
• • Build anti-virus signatures.
• • Intelligence gathering (Symantec / Arbor)
• • Build SPAM signatures and filters.
• • Build RBL’s (Real-time Blackhole List) for malicious websites.
• • ISP’s identify compromised systems.
• • Assist law-enforcement to track criminals.
• • Hunt and shutdown botnets.
• • Malware collection and analysis.
7
Benefits of deploying honeypot
Advantages & Disadvantages
Types
9
• Low Interaction Honeypot
• Low-interaction honeypots are typically the
easiest honeypots to install, configure, deploy
and maintain. They partially emulate a service
(e.g. Unix telnet server or Microsoft’s IIS) or
operating system and limit the attacker’s
activities to the level of emulation provided by
the software.
• Advantages
• Logging and analyzing is simple
• only transactional information are available, no
information about the attacks themselves, e.g.
time and date of an attack, protocol, source and
destination IP as well as port)
• Disadvantages
• Very limited logging abilities
• Can only capture known attacks
• Easily detectable by a skilled attacker
High Interaction Honeypot
Provide an attacker with a real operating system
where nothing is emulated or restricted.
Ideally you are rewarded with a vast amount of
information about attackers, their motivation,
actions, tools, behaviour, level of knowledge,
origin, identity etc.
Advantages
Learn as much as possible about the attacker,
the attack itself and especially the methodology
as well as tools used.
Disadvantages
Building, configuring, deploying and maintaining
a high-interaction honeypot is very time
consuming as it involves a variety of different
technologies (e.g. IDS, firewall etc.) that has to
be customized.
BackOfficer Friendly:
Honeypot Tools
A free win32 based honeypot solution by NFR Security (a separate Unix port is available but has
restricted functionality). It is able to emulate single services such as telnet, ftp, smtp and to rudimentary
log connection attempts
NFR® BackOfficer Friendly is a useful little burglar alarm - simple, unobtrusive, and easy to install - which
rings when someone rattles your doorknob. It identifies attacks from Back Orifice, one of the nastier
hacking applications, as well as other sorts of scans. NFR is currently offering BackOfficer Friendly as a
FREE download for personal use only
10
SPECTER
Honeypot Tools
SPECTER is a smart honeypot-based intrusion detection system. It simulates a vulnerable computer,
providing an interesting target to lure hackers away from the production machines. SPECTER offers
common Internet services such as SMTP, FTP, POP3, HTTP and TELNET which appear perfectly normal to
the attackers but in fact are traps for them to mess around and leave traces without even knowing that
they are connected to a decoy system, which does none of the things it appears to do, but instead logs
everything and notifies the appropriate people.
11
So you want to build your own honeypot
Honeypots Solutions
http://www.tracking-hackers.com/solutions/
12
non-profit, research organization improving the security of the Internet at no cost.
Honeynets
• Concept of honeynet
project
• High-interaction honeypot
designed to capture in-
depth information.
• Information has different
value to different
organizations.
• Its an architecture you
populate with live systems,
not a product or software.
• Any traffic entering or
leaving is suspect
• Threats
• Hundreds of scans a day.
• Fastest time honeypot manually
compromised, 15 minutes
(worm, under 60 seconds).
• Life expectancies: vulnerable
Win32 system is under three
hours, vulnerable Linux system is
three months.
• Primarily cyber-crime, focus on
Win32 systems and their users.
• Attackers can control thousands
of systems (Botnets).
13
Architecture
Honeynet
14
1. Data Capture
3. Data Analysis
2. Data Control
15
What’s happening?
Do this knowledge need for me
Boundless Informant: US gov't collects 100 billion surveillance records a month
Cyber-Security Market
Growing at a CAGR of 11.3% and to Reach $120.1 Billion by 2017
The most dramatic cyber attack in recent times was that of STUXNET. In 2010, STUXNET, the first malware able
to take control of low-level industrial devices, i.e., a centrifuge of nuclear power plants was spread. This fact
made everybody reflect on the fact that cyber-security was not anymore a matter of securing servers and
software, company data and continuity, but a matter of citizen safety.
• Identity & Access Management,
• Risk & Compliance Management,
• Data Encryption,
• Data Leakage Prevention Solution,
• Data Recovery Solutions,
• UTM, Anti-Virus, IPS/IDS, Web Filtering,
• Fire-Wall, Vulnerability Management
• DDoS Protection
Reference - http://www.prweb.com/releases/cyber-security/market/prweb10700570.htm

More Related Content

What's hot

Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
SILPI ROSAN
 

What's hot (20)

Honeypots
HoneypotsHoneypots
Honeypots
 
Virtual honeypot
Virtual honeypotVirtual honeypot
Virtual honeypot
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot
Honeypot Honeypot
Honeypot
 
Honeypots for Network Security
Honeypots for Network SecurityHoneypots for Network Security
Honeypots for Network Security
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
 
Honeypot Basics
Honeypot BasicsHoneypot Basics
Honeypot Basics
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Honeypot based intrusion detection system PPT
Honeypot based intrusion detection system PPTHoneypot based intrusion detection system PPT
Honeypot based intrusion detection system PPT
 
Honeypot a trap to hackers
Honeypot a trap to hackersHoneypot a trap to hackers
Honeypot a trap to hackers
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on Honeypot
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection Presentation
 
Honey po tppt
Honey po tpptHoney po tppt
Honey po tppt
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 

Viewers also liked

Viewers also liked (11)

IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypot 101 (slide share)
Honeypot 101 (slide share)Honeypot 101 (slide share)
Honeypot 101 (slide share)
 
Honeypots - November 8th Misec presentation
Honeypots - November 8th Misec presentationHoneypots - November 8th Misec presentation
Honeypots - November 8th Misec presentation
 
Honeypots.ppt1800363876
Honeypots.ppt1800363876Honeypots.ppt1800363876
Honeypots.ppt1800363876
 
Client Side Honeypots
Client Side HoneypotsClient Side Honeypots
Client Side Honeypots
 
Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)
 
Air Muscles:-The Neo Pneumatic Actuators
Air Muscles:-The Neo Pneumatic ActuatorsAir Muscles:-The Neo Pneumatic Actuators
Air Muscles:-The Neo Pneumatic Actuators
 
Using Canary Honeypots for Network Security Monitoring
Using Canary Honeypots for Network Security MonitoringUsing Canary Honeypots for Network Security Monitoring
Using Canary Honeypots for Network Security Monitoring
 
Honey pots
Honey potsHoney pots
Honey pots
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 

Similar to Honeypots and honeynets

2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
Raffa Learning Community
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 

Similar to Honeypots and honeynets (20)

honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
 
Honeypot
HoneypotHoneypot
Honeypot
 
Network Security
Network SecurityNetwork Security
Network Security
 
The Threat Landscape & Network Security Measures
The Threat Landscape & Network Security MeasuresThe Threat Landscape & Network Security Measures
The Threat Landscape & Network Security Measures
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Lecture 7
Lecture 7Lecture 7
Lecture 7
 
Ananth3
Ananth3Ananth3
Ananth3
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypot and deception
Honeypot and deceptionHoneypot and deception
Honeypot and deception
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot
HoneypotHoneypot
Honeypot
 
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantages
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and Organization
 
M0704071074
M0704071074M0704071074
M0704071074
 
Honeypots
HoneypotsHoneypots
Honeypots
 
APT in the Financial Sector
APT in the Financial SectorAPT in the Financial Sector
APT in the Financial Sector
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 

More from Rasool Irfan

More from Rasool Irfan (8)

45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions
 
Digital workplace security for gen z
Digital workplace security for gen zDigital workplace security for gen z
Digital workplace security for gen z
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentation
 
Build cost effective Security Data Lake + SIEM
Build cost effective Security Data Lake + SIEMBuild cost effective Security Data Lake + SIEM
Build cost effective Security Data Lake + SIEM
 
Maximize your investment with AWS Native Security Controls
Maximize your investment with AWS Native Security ControlsMaximize your investment with AWS Native Security Controls
Maximize your investment with AWS Native Security Controls
 
Multi Cloud Security Technology Requirements.
Multi Cloud Security Technology Requirements. Multi Cloud Security Technology Requirements.
Multi Cloud Security Technology Requirements.
 
Ethical Hacking by Rasool Kareem Irfan
Ethical Hacking by Rasool Kareem IrfanEthical Hacking by Rasool Kareem Irfan
Ethical Hacking by Rasool Kareem Irfan
 
Your growth in corporate life
Your growth in corporate lifeYour growth in corporate life
Your growth in corporate life
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

Honeypots and honeynets

  • 1. Honeypots & Honeynets Tech Talk June’13 Rasool Kareem Irfan | @rasoolirfan
  • 2. Agenda 1. Preface 2. Value of Honeypot – What & Why 3. Benefits of deploying Honeypot 4. Types – Advantages & Disadvantages 5. Honeynets • Concept • Threat and Trends • Architecture 6. Cyber Security Market 7. Questions 2
  • 3. The Problem Preface  Hacker/ Intruder/ Attacker  The security state of internet is poor  Anyone is the target..!  Tools getting better  Why do they attack? 3
  • 4. Lionel Giles once said: “Everybody can see superficially how a battle is won; what they cannot see are the long series of plans and combinations which have preceded the battle”
  • 6. What is Honeypot Value of Honeypot • Abstract definition: • “A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource.” (Lance Spitzner) • Concrete definition: • “A honeypot is a fictitious vulnerable IT system used for the purpose of being attacked, probed, exploited and compromised.” 6 Their Value • Primary value of honeypots is to collect information. • This information is then used to better identify, understand and protect against threats. • Honeypots add little direct value to protect your network
  • 7. Why Honeypot Value of Honeypot • A great deal of the security profession (and the IT world) depend honeypots, however few know it. Honeypots … • • Build anti-virus signatures. • • Intelligence gathering (Symantec / Arbor) • • Build SPAM signatures and filters. • • Build RBL’s (Real-time Blackhole List) for malicious websites. • • ISP’s identify compromised systems. • • Assist law-enforcement to track criminals. • • Hunt and shutdown botnets. • • Malware collection and analysis. 7
  • 9. Advantages & Disadvantages Types 9 • Low Interaction Honeypot • Low-interaction honeypots are typically the easiest honeypots to install, configure, deploy and maintain. They partially emulate a service (e.g. Unix telnet server or Microsoft’s IIS) or operating system and limit the attacker’s activities to the level of emulation provided by the software. • Advantages • Logging and analyzing is simple • only transactional information are available, no information about the attacks themselves, e.g. time and date of an attack, protocol, source and destination IP as well as port) • Disadvantages • Very limited logging abilities • Can only capture known attacks • Easily detectable by a skilled attacker High Interaction Honeypot Provide an attacker with a real operating system where nothing is emulated or restricted. Ideally you are rewarded with a vast amount of information about attackers, their motivation, actions, tools, behaviour, level of knowledge, origin, identity etc. Advantages Learn as much as possible about the attacker, the attack itself and especially the methodology as well as tools used. Disadvantages Building, configuring, deploying and maintaining a high-interaction honeypot is very time consuming as it involves a variety of different technologies (e.g. IDS, firewall etc.) that has to be customized.
  • 10. BackOfficer Friendly: Honeypot Tools A free win32 based honeypot solution by NFR Security (a separate Unix port is available but has restricted functionality). It is able to emulate single services such as telnet, ftp, smtp and to rudimentary log connection attempts NFR® BackOfficer Friendly is a useful little burglar alarm - simple, unobtrusive, and easy to install - which rings when someone rattles your doorknob. It identifies attacks from Back Orifice, one of the nastier hacking applications, as well as other sorts of scans. NFR is currently offering BackOfficer Friendly as a FREE download for personal use only 10
  • 11. SPECTER Honeypot Tools SPECTER is a smart honeypot-based intrusion detection system. It simulates a vulnerable computer, providing an interesting target to lure hackers away from the production machines. SPECTER offers common Internet services such as SMTP, FTP, POP3, HTTP and TELNET which appear perfectly normal to the attackers but in fact are traps for them to mess around and leave traces without even knowing that they are connected to a decoy system, which does none of the things it appears to do, but instead logs everything and notifies the appropriate people. 11
  • 12. So you want to build your own honeypot Honeypots Solutions http://www.tracking-hackers.com/solutions/ 12
  • 13. non-profit, research organization improving the security of the Internet at no cost. Honeynets • Concept of honeynet project • High-interaction honeypot designed to capture in- depth information. • Information has different value to different organizations. • Its an architecture you populate with live systems, not a product or software. • Any traffic entering or leaving is suspect • Threats • Hundreds of scans a day. • Fastest time honeypot manually compromised, 15 minutes (worm, under 60 seconds). • Life expectancies: vulnerable Win32 system is under three hours, vulnerable Linux system is three months. • Primarily cyber-crime, focus on Win32 systems and their users. • Attackers can control thousands of systems (Botnets). 13
  • 14. Architecture Honeynet 14 1. Data Capture 3. Data Analysis 2. Data Control
  • 15. 15 What’s happening? Do this knowledge need for me Boundless Informant: US gov't collects 100 billion surveillance records a month
  • 16. Cyber-Security Market Growing at a CAGR of 11.3% and to Reach $120.1 Billion by 2017 The most dramatic cyber attack in recent times was that of STUXNET. In 2010, STUXNET, the first malware able to take control of low-level industrial devices, i.e., a centrifuge of nuclear power plants was spread. This fact made everybody reflect on the fact that cyber-security was not anymore a matter of securing servers and software, company data and continuity, but a matter of citizen safety. • Identity & Access Management, • Risk & Compliance Management, • Data Encryption, • Data Leakage Prevention Solution, • Data Recovery Solutions, • UTM, Anti-Virus, IPS/IDS, Web Filtering, • Fire-Wall, Vulnerability Management • DDoS Protection Reference - http://www.prweb.com/releases/cyber-security/market/prweb10700570.htm