BRIEFING
CYBER THREAT
DEFENSE IN REAL-TIME
LETS ADMIT “FAILURE”
“Top engineering has been failed repeatedly, reasons for this
sustained failure is beyond the engineering itself.”
FOCUS ON CYBER
THREAT DEFENSE
Maybe it’s the lack of
DEEPER
THOUGHT
Why do we fail to execute an
effective cyber defense program
1
 2
 3
The three primary requirements of a successful
cyber threat defense program are
EXPERTISE
There is an extreme shortage of quality
expertise required for cyber threat defense
Essential Requirements!
1.  Continuous awareness to the external
security threat landscape
2.  Being native and understanding the need of
the local environment
3.  Skill, expertise and experience required to
marry threat awareness with the local
enterprise environment
1
 2
 3
The three primary requirements of a successful
cyber threat defense program are
EXPERTISE
THREAT
INTELLIGENCE
The flood of intelligence feeds makes it difficult
to curate and maintain situational awareness
Essential Requirements!
1.  Real-time threat intelligence data sources
need to be aggregated and curated
2.  Integration with relevant data sources within
the enterprise network
3.  Establishing the right context and
continuous re-evaluation of data synergies
1
 2
 3
The three primary requirements of a successful
cyber threat defense program are
EXPERTISE
THREAT
INTELLIGENCE
DATA
SYSTEMS
Lack of visibility or control on threat detection
systems degrades accuracy of the system
Essential Requirements!
1.  Real-time threat detection engines to detect
network and packet flow level attacks
2.  Application integration and monitoring
systems for real-time application analytics
3.  Security orchestration systems to integrate
and monitor the enterprise threat landscape
in real-time
1
 2
 3
The three primary requirements of a successful
cyber threat defense program are
EXPERTISE
THREAT
INTELLIGENCE
DATA
SYSTEMS
1
 2
 3
CNAM delivers all the primary requirements in
an easy monthly subscription model
EXPERTISE
THREAT
INTELLIGENCE
DATA
SYSTEMS
CNAM
CNAM is a SaaS delivered SIEM built ground
up for the Threat Management use case
BENEFITS OF THE PRODUCT
1.  The detection stack is a part of the
platform and managed by CNAM
2.  Curated threat intelligence feeds and
context based customization
3.  Integrates with applications and
monitors critical parameters
4.  Real-time delivery and a
comprehensive threat analysis engine
BENEFITS OF THE MODEL
1.  Accuracy of threat intelligence and
analytics forms a part of the SLA
2.  No upfront investment, small
customers can start small
3.  Data privacy is maintained with the
product operating from within the
enterprise perimeter
4.  Allows you to disengage with out any
penalties or exit charges
NETMONASTERY Named Gartner Cool Vendor in Security for
Technology and Service Providers, 2014
CNAM THREAT PLATFORM
DELIVERS THE JUICE
AND NOT THE JUICER

WHY WE FAIL TO DETECT HACKERS ON THE INTERNET

  • 1.
  • 2.
    LETS ADMIT “FAILURE” “Topengineering has been failed repeatedly, reasons for this sustained failure is beyond the engineering itself.”
  • 3.
    FOCUS ON CYBER THREATDEFENSE Maybe it’s the lack of
  • 4.
    DEEPER THOUGHT Why do wefail to execute an effective cyber defense program
  • 5.
    1 2 3 Thethree primary requirements of a successful cyber threat defense program are
  • 6.
  • 7.
    There is anextreme shortage of quality expertise required for cyber threat defense Essential Requirements! 1.  Continuous awareness to the external security threat landscape 2.  Being native and understanding the need of the local environment 3.  Skill, expertise and experience required to marry threat awareness with the local enterprise environment
  • 8.
    1 2 3 Thethree primary requirements of a successful cyber threat defense program are EXPERTISE
  • 9.
  • 10.
    The flood ofintelligence feeds makes it difficult to curate and maintain situational awareness Essential Requirements! 1.  Real-time threat intelligence data sources need to be aggregated and curated 2.  Integration with relevant data sources within the enterprise network 3.  Establishing the right context and continuous re-evaluation of data synergies
  • 11.
    1 2 3 Thethree primary requirements of a successful cyber threat defense program are EXPERTISE THREAT INTELLIGENCE
  • 12.
  • 13.
    Lack of visibilityor control on threat detection systems degrades accuracy of the system Essential Requirements! 1.  Real-time threat detection engines to detect network and packet flow level attacks 2.  Application integration and monitoring systems for real-time application analytics 3.  Security orchestration systems to integrate and monitor the enterprise threat landscape in real-time
  • 14.
    1 2 3 Thethree primary requirements of a successful cyber threat defense program are EXPERTISE THREAT INTELLIGENCE DATA SYSTEMS
  • 15.
    1 2 3 CNAMdelivers all the primary requirements in an easy monthly subscription model EXPERTISE THREAT INTELLIGENCE DATA SYSTEMS CNAM
  • 16.
    CNAM is aSaaS delivered SIEM built ground up for the Threat Management use case BENEFITS OF THE PRODUCT 1.  The detection stack is a part of the platform and managed by CNAM 2.  Curated threat intelligence feeds and context based customization 3.  Integrates with applications and monitors critical parameters 4.  Real-time delivery and a comprehensive threat analysis engine BENEFITS OF THE MODEL 1.  Accuracy of threat intelligence and analytics forms a part of the SLA 2.  No upfront investment, small customers can start small 3.  Data privacy is maintained with the product operating from within the enterprise perimeter 4.  Allows you to disengage with out any penalties or exit charges
  • 17.
    NETMONASTERY Named GartnerCool Vendor in Security for Technology and Service Providers, 2014
  • 18.
    CNAM THREAT PLATFORM DELIVERSTHE JUICE AND NOT THE JUICER