SlideShare a Scribd company logo
INTERCEPT
Intercept automatically discovers any digital device connected to your
network, perimeter or endpoint to identify, detect and analyse any
cyber-threat to the organisation. Intercept offers the broadest coverage
all potential organisational access points for unparalleled protection.
ENDPOINT & HUMAN VULNERABILITIES
Most cyber security firms assume that
attackers can only enter here
NETWORK
ATTACKER
REMOTE
PERIMETER
INTERCEPT PLATFORM
Purpose engineered, proprietary next-
generation analysis, detection and
response. Intercept is a proprietary
platform developed to exceed current
industry cyber crime detection and
analysis mechanisms for exceptional
coverage and speedy turnaround from
first indicator of compromise (IOC).
Most cyber security firms base their defenses on the assumption that all attacks will occur from an endpoint
or human vulnerability. Intercept knows that sophisticated cyber criminals can enter your network through
other avenues linked directly to your perimeter or different network components, skipping endpoints altogether.
Intercept is different from other tools in that it will proactively discover any digital device from endpoints
to IOT devices on your network. Our technology processes all the collected data to detect behavioral
anomalies and ensures that no devices are mistakenly left out from being monitored.
What Makes Intercept Different?
Intercept automatically covers
all aspects of your endpoint,
perimeter and network through
a variety of tools to detect
and protect against any
unauthorised entry with
extreme speed and accuracy.
andrew.chester@acds.email +27 83 442 9025 www.intercept.systems
Offering:
•	 Our response time is 30-minutes* from IOC to 	
	 locating and isolating the attackers. The industry 	
	 average is 24-hours
•	 Seamlessly integrates with any other tool and 	
	 works in conjunction with existing mechanisms
•	 Proactively and automatically detects devices
•	 Agents deployed to devices are resource light
•	 Immediate detection and isolation/response
	 to threats
•	 Full coverage - Intercept is a Platform as a
	 Service (PaaS) that defends every digital
	 device in your environment
•	 Seamlessly integrates with any other tool and 	
	 works in conjunction with existing mechanisms
•	 Proactively and automatically detects devices
•	 Agents deployed to devices are resource light
•	 Immediate detection and isolation/response
	 to threats
•	 Threat Hunting and Security Visibility within
	 the first 24 hours
•	 Cloud based analysis, works anywhere, YARA
	 and Sigma compatible
•	 Utilises proprietary as well as partner-based
	 threat intelligence
•	 Intercept Endpoint Detection and Response 		
	 services per device costs approximately 82,5%
	 less than its closest competitor
•	 We see everything. We monitor 4 Billion IPv4 		
	 Addresses, which is scanned every 45 minutes.
	 We have 2750 Class-C Networks hosting honeynets
•	 We see 4 to 5 million IP Addresses sink-holed
	 across 400 different malware variants everyday
•	 We have over 700 000 unique malware samples 	
	 ingested and analysed by our sandboxes every day
•	 Our response time is 30-minutes (if deployed 		
	 correctly*) from IOC to locating and isolating
	 the attackers. The industry average is 24-hours
Intercept is different:
Other Tools
•	 Manually linked to endpoint/IOT devices
•	 Prone to human error - might miss a log source
•	 Resource intensive on infrastructure
Intercept
•	 Actively discovers all endpoints/IOT devices
•	 Automatically processes all data processors
	 to conduct detection and analysis functions
•	 Detects and isolates IOC within 30 minutes
	 (if deployed correctly)
Intercept Includes:
Dedicated Services from
Multidisciplinary (Purple
team) SOC and Offensive
Security teams
Rapid Detection
& Response
Vulnerability Management
and Validation
Threat Intelligence Delivery &
Validation Using Risk Scoring
Threat Hunting
and Validation
Robust Advisory &
Consulting Services
How Intercept Works
Intercept’s Kill Chain
INTERCEPT THREAT HUNTING DOMAININTERCEPT THREAT HUNTING DOMAIN
INTERCEPT ALPHA SECURITY ENGINE
USER BEHAVIOUR
MONITORING
ENDPOINT
MONITORING
SERVER
MONITORING
FIREWALL
MONITORING
ROUTER
MONITORING
SWITCH
MONITORING
SECURE OUTBOUND VPN
UTILISING CLIENT EXISTING CONNECTIVITY
INTERCEPT TEAM CLOUD SOC
PREPARATION
INTRUSION
ACTIVE BREACH
HOURSTOMINUTESSECONDSMONTHS
RECONNAISSANCE
Harvesting email addresses,
conference information, etc
WEAPONIZATION
Coupling exploit with back door
into deliverable payload
DELIVERY
Delivering weaponized bundle to
the victim via email, web, USB etc
EXPLOITATION
Exploiting a vulnerability to
execute code on victim’s system
INSTALLATION
Installing malware on the asset
COMMAND & CONTROL (C2)
Command channel for remote
manipulation of victim’s system
ACTION & OBJECTIVES
Intruders get ‘hands on keyboard’
access to accomplish anything
1
2
3
4
5
6
7
Intercept License Pricing (per month)
Managed Services
Number of Endpoint Devices 1-300 301-500 501-700 701-1000 1000+
Per Perimeter Network Device
(Any device that connects to an external
network, Eg: routers, etc)
$ 100.00 $ 100.00 $ 100.00 $ 100.00 Contact Us
Per Endpoint Device
(Laptop, Table, mobile phone, server, etc)
$ 3.50 $ 3.41 $ 3.33 $ 3.24 Contact Us
Per Node
(Provide network-level threat detection,
anomaly detection, intrusion detection
& vulnerability analysis, & threat scoring)
$ 850.00 $ 828.75 $ 808.03 $ 787.83 Contact Us
Digital Forensic and Incident Response
License for 365-days
$ 1,550.00 $ 3,022.50 $ 4,533.75 $ 6,200.00 Contact Us
MSSP Standard SLA Unlimited SLA
Duration 1 year 1 year
Support Method Help desk / Phone / On site Help desk / Phone / On site
Response Time 30 Minutes for Premium Telephonic Calls 15 Minutes for Premium Telephonic Calls
Support Hours 24/7 24/7
Included Incidents1 100 Unlimited
Included Consulting Hours2 50 Unlimited
24/7 Threat Hunting, Rapid Detection
and Response
Yes Yes
Cost Per Year $ 69 950.00 On Request3
All pricing is subject to Ts & Cs specific to a clients environment.
Please chat to us for a more specific proposal dependent to your specific environment.
1.	Pricing is based on 300 devices and 30-days worth of data storage in our cloud environment. Pricing is calculated on the amount of devices per year to ensure that
we provide the correct amount of cloud compute & storage required to support them. On this pricing tier, we assume the client has a SIEM or event logging platform
to send the data to, to store events and data for longer than 30 days.
2.	One Node can support up to 350 devices, or one /24 subnet. This excludes any hardware required to run the software, or provide local storage, however hardware
can be speced and provided as required, depending on the size of the network. It can be virtualized if the client has a supported virtual platform. It can also run on
cloud networks.
3.	Extends the endpoint data storage from 30-days to 365-days, allowing us/the client to retrospectively hunt for threats. This price is calculated to provide the correct
amount of cloud compute and storage requirements for the size of the environment. Includes Intercept digital forensics suite, allowing anyone to hunt and carve digital
forensic artifacts and IOC’s, as well as provide active response, automation and orchestration to security incident response.
andrew.chester@acds.email +27 83 442 9025 www.intercept.systems

More Related Content

What's hot

Paper1
Paper1Paper1
Paper1
SpacSec
 
RSA Anatomy of an Attack
RSA Anatomy of an AttackRSA Anatomy of an Attack
RSA Anatomy of an Attack
integritysolutions
 
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for  Intrusion DetectionCloudslam09:Building a Cloud Computing Analysis System for  Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
Wei-Yu Chen
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project Report
Raghav Bisht
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPS
mmiznoni
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Roshan Ranabhat
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
Nikhil Raj
 
IDS/IPS security
IDS/IPS securityIDS/IPS security
IDS/IPS security
Clarejenson
 
NTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New WorldNTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New World
North Texas Chapter of the ISSA
 
Using Genetic algorithm for Network Intrusion Detection
Using Genetic algorithm for Network Intrusion DetectionUsing Genetic algorithm for Network Intrusion Detection
Using Genetic algorithm for Network Intrusion Detection
Sagar Uday Kumar
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUES
Trinity Dwarka
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...Chrysostomos Christofi
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)
Netwax Lab
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting
Shah Sheikh
 
Intrusion Detection And Prevention
Intrusion Detection And PreventionIntrusion Detection And Prevention
Intrusion Detection And PreventionNicholas Davis
 
Hunting: Defense Against The Dark Arts
Hunting: Defense Against The Dark ArtsHunting: Defense Against The Dark Arts
Hunting: Defense Against The Dark Arts
Spyglass Security
 
Ids 001 ids vs ips
Ids 001 ids vs ipsIds 001 ids vs ips
Ids 001 ids vs ips
jyoti_lakhani
 

What's hot (19)

Paper1
Paper1Paper1
Paper1
 
RSA Anatomy of an Attack
RSA Anatomy of an AttackRSA Anatomy of an Attack
RSA Anatomy of an Attack
 
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for  Intrusion DetectionCloudslam09:Building a Cloud Computing Analysis System for  Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project Report
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPS
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
IDS/IPS security
IDS/IPS securityIDS/IPS security
IDS/IPS security
 
NTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New WorldNTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New World
 
Using Genetic algorithm for Network Intrusion Detection
Using Genetic algorithm for Network Intrusion DetectionUsing Genetic algorithm for Network Intrusion Detection
Using Genetic algorithm for Network Intrusion Detection
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUES
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting
 
Ids & ips
Ids & ipsIds & ips
Ids & ips
 
Intrusion Detection And Prevention
Intrusion Detection And PreventionIntrusion Detection And Prevention
Intrusion Detection And Prevention
 
Hunting: Defense Against The Dark Arts
Hunting: Defense Against The Dark ArtsHunting: Defense Against The Dark Arts
Hunting: Defense Against The Dark Arts
 
Ids 001 ids vs ips
Ids 001 ids vs ipsIds 001 ids vs ips
Ids 001 ids vs ips
 

Similar to Intercept product

Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That Works
Brett L. Scott
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
ahmed53254
 
Network and web security
Network and web securityNetwork and web security
Network and web security
Nitesh Saitwal
 
Aca presentation arm_
Aca presentation arm_Aca presentation arm_
Aca presentation arm_
Mudassar Mehmud
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
Sripati Mahapatra
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
laonap166
 
Have you been Hacked
Have you been HackedHave you been Hacked
Have you been Hacked
David Pereira
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
martinvoelk
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
SAIKAT BISWAS
 
UEBA
UEBAUEBA
Cloud Computing & Security
Cloud Computing & SecurityCloud Computing & Security
Cloud Computing & Security
Awais Mansoor Chohan
 
information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...
Zara Nawaz
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
hidivin652
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
edwardstudyemai
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochure
George Wainblat
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
GulshanAra14
 
CYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEETCYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEET
TravarsaPrivateLimit
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network SecurityHarish Chaudhary
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity Innovation
Pete Burnap
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Angeloluca Barba
 

Similar to Intercept product (20)

Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That Works
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
Aca presentation arm_
Aca presentation arm_Aca presentation arm_
Aca presentation arm_
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
Have you been Hacked
Have you been HackedHave you been Hacked
Have you been Hacked
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
UEBA
UEBAUEBA
UEBA
 
Cloud Computing & Security
Cloud Computing & SecurityCloud Computing & Security
Cloud Computing & Security
 
information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochure
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
CYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEETCYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEET
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity Innovation
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Intercept product

  • 1. INTERCEPT Intercept automatically discovers any digital device connected to your network, perimeter or endpoint to identify, detect and analyse any cyber-threat to the organisation. Intercept offers the broadest coverage all potential organisational access points for unparalleled protection. ENDPOINT & HUMAN VULNERABILITIES Most cyber security firms assume that attackers can only enter here NETWORK ATTACKER REMOTE PERIMETER INTERCEPT PLATFORM Purpose engineered, proprietary next- generation analysis, detection and response. Intercept is a proprietary platform developed to exceed current industry cyber crime detection and analysis mechanisms for exceptional coverage and speedy turnaround from first indicator of compromise (IOC). Most cyber security firms base their defenses on the assumption that all attacks will occur from an endpoint or human vulnerability. Intercept knows that sophisticated cyber criminals can enter your network through other avenues linked directly to your perimeter or different network components, skipping endpoints altogether. Intercept is different from other tools in that it will proactively discover any digital device from endpoints to IOT devices on your network. Our technology processes all the collected data to detect behavioral anomalies and ensures that no devices are mistakenly left out from being monitored. What Makes Intercept Different? Intercept automatically covers all aspects of your endpoint, perimeter and network through a variety of tools to detect and protect against any unauthorised entry with extreme speed and accuracy. andrew.chester@acds.email +27 83 442 9025 www.intercept.systems
  • 2. Offering: • Our response time is 30-minutes* from IOC to locating and isolating the attackers. The industry average is 24-hours • Seamlessly integrates with any other tool and works in conjunction with existing mechanisms • Proactively and automatically detects devices • Agents deployed to devices are resource light • Immediate detection and isolation/response to threats • Full coverage - Intercept is a Platform as a Service (PaaS) that defends every digital device in your environment • Seamlessly integrates with any other tool and works in conjunction with existing mechanisms • Proactively and automatically detects devices • Agents deployed to devices are resource light • Immediate detection and isolation/response to threats • Threat Hunting and Security Visibility within the first 24 hours • Cloud based analysis, works anywhere, YARA and Sigma compatible • Utilises proprietary as well as partner-based threat intelligence • Intercept Endpoint Detection and Response services per device costs approximately 82,5% less than its closest competitor • We see everything. We monitor 4 Billion IPv4 Addresses, which is scanned every 45 minutes. We have 2750 Class-C Networks hosting honeynets • We see 4 to 5 million IP Addresses sink-holed across 400 different malware variants everyday • We have over 700 000 unique malware samples ingested and analysed by our sandboxes every day • Our response time is 30-minutes (if deployed correctly*) from IOC to locating and isolating the attackers. The industry average is 24-hours Intercept is different: Other Tools • Manually linked to endpoint/IOT devices • Prone to human error - might miss a log source • Resource intensive on infrastructure Intercept • Actively discovers all endpoints/IOT devices • Automatically processes all data processors to conduct detection and analysis functions • Detects and isolates IOC within 30 minutes (if deployed correctly) Intercept Includes: Dedicated Services from Multidisciplinary (Purple team) SOC and Offensive Security teams Rapid Detection & Response Vulnerability Management and Validation Threat Intelligence Delivery & Validation Using Risk Scoring Threat Hunting and Validation Robust Advisory & Consulting Services
  • 3. How Intercept Works Intercept’s Kill Chain INTERCEPT THREAT HUNTING DOMAININTERCEPT THREAT HUNTING DOMAIN INTERCEPT ALPHA SECURITY ENGINE USER BEHAVIOUR MONITORING ENDPOINT MONITORING SERVER MONITORING FIREWALL MONITORING ROUTER MONITORING SWITCH MONITORING SECURE OUTBOUND VPN UTILISING CLIENT EXISTING CONNECTIVITY INTERCEPT TEAM CLOUD SOC PREPARATION INTRUSION ACTIVE BREACH HOURSTOMINUTESSECONDSMONTHS RECONNAISSANCE Harvesting email addresses, conference information, etc WEAPONIZATION Coupling exploit with back door into deliverable payload DELIVERY Delivering weaponized bundle to the victim via email, web, USB etc EXPLOITATION Exploiting a vulnerability to execute code on victim’s system INSTALLATION Installing malware on the asset COMMAND & CONTROL (C2) Command channel for remote manipulation of victim’s system ACTION & OBJECTIVES Intruders get ‘hands on keyboard’ access to accomplish anything 1 2 3 4 5 6 7
  • 4. Intercept License Pricing (per month) Managed Services Number of Endpoint Devices 1-300 301-500 501-700 701-1000 1000+ Per Perimeter Network Device (Any device that connects to an external network, Eg: routers, etc) $ 100.00 $ 100.00 $ 100.00 $ 100.00 Contact Us Per Endpoint Device (Laptop, Table, mobile phone, server, etc) $ 3.50 $ 3.41 $ 3.33 $ 3.24 Contact Us Per Node (Provide network-level threat detection, anomaly detection, intrusion detection & vulnerability analysis, & threat scoring) $ 850.00 $ 828.75 $ 808.03 $ 787.83 Contact Us Digital Forensic and Incident Response License for 365-days $ 1,550.00 $ 3,022.50 $ 4,533.75 $ 6,200.00 Contact Us MSSP Standard SLA Unlimited SLA Duration 1 year 1 year Support Method Help desk / Phone / On site Help desk / Phone / On site Response Time 30 Minutes for Premium Telephonic Calls 15 Minutes for Premium Telephonic Calls Support Hours 24/7 24/7 Included Incidents1 100 Unlimited Included Consulting Hours2 50 Unlimited 24/7 Threat Hunting, Rapid Detection and Response Yes Yes Cost Per Year $ 69 950.00 On Request3 All pricing is subject to Ts & Cs specific to a clients environment. Please chat to us for a more specific proposal dependent to your specific environment. 1. Pricing is based on 300 devices and 30-days worth of data storage in our cloud environment. Pricing is calculated on the amount of devices per year to ensure that we provide the correct amount of cloud compute & storage required to support them. On this pricing tier, we assume the client has a SIEM or event logging platform to send the data to, to store events and data for longer than 30 days. 2. One Node can support up to 350 devices, or one /24 subnet. This excludes any hardware required to run the software, or provide local storage, however hardware can be speced and provided as required, depending on the size of the network. It can be virtualized if the client has a supported virtual platform. It can also run on cloud networks. 3. Extends the endpoint data storage from 30-days to 365-days, allowing us/the client to retrospectively hunt for threats. This price is calculated to provide the correct amount of cloud compute and storage requirements for the size of the environment. Includes Intercept digital forensics suite, allowing anyone to hunt and carve digital forensic artifacts and IOC’s, as well as provide active response, automation and orchestration to security incident response. andrew.chester@acds.email +27 83 442 9025 www.intercept.systems