SlideShare a Scribd company logo
Real-Time Security Monitoring
 Setting the benchmark for attack detection


            COMPANY PROFILE
               NetMonastery NSPL
Executive Summary
Space Definition
                       The Situation
With company data available on        Online threats are increasing,
the network security is an            and companies are investing
increasingly important area for       heavily to ensure that they have
most if not all organizations
        comprehensive protection
                 
Here We Are !
                         Current State
NetMonastery provides an              After having several of India’s
online, real-time, cloud-based        largest companies, as clients
solution to detect and escalates      NetMonastery plans to rapidly
threats in real-time
                 grow its technology lineup
  NetMonastery is a company providing online, real-time, network security
                       threat detection since 2009
NetMonastery !

Who
                               Business
An agile and courageous group      Detecting attackers and their
of people who innovate             latest tricks in Real-time.
everywhere, and also specialize    Further, providing only the
in computer security.
             actionable to a customer.
               

Highlights
                        Vision
Secured the CWG website the        Deliver effective security
most attacked Indian website,      solutions that define the future
similarly protecting the largest   and demonstrate the courage
organizations across verticals.
   to be the change.
Problem Statement and Current Options

NEED OF THE HOUR!
Problem
Accountability
                     Capability
One organization has multiple       Attack detection requires
security devices managed by         experience and constant
different groups with no sync       research. Organizations are still
or accountability.
                 struggling with their FMS.
                
Preparedness
                       Measurability
Being available and awake is        Q: How secure are you ?
the first step, but delivering the   A: This year we spent 2Mill on
correct attack analysis at 3 am     security and testing. There is
is the challenge.
                  no measuring yardstick.
                
                                   
        What we can’t measure, we can’t improve.
Current Standards
Firewalls
                              Intrusion Prevention System
The old war horse, the central          Effective but plagued with false
pillar of most infrastructures.         alarms, require an expert
Most attacks cross firewalls as          resource to extract the real
legit traffic and then blow up.
        juice.
                 
SIEM
                                   Managed Security Providers
Cost is the first entry barrier, an      Put all of the above in a box
expert team is the second. You          and delivered as a service. Have
can buy a jumbo but you will            been reduced to managers of
still need a pilot to fly it !
          the above, no value add…
                 
                                       
  Timely, Accurate, Actionable and Affordable are the keys that are missing
Solution, Service and Value Proposition

ATTACK DETECTION
Intro CNAM


CNAM is an efficient and quickly deployable solution for
   guarding your IT system and offers round-the-clock
monitoring and real-time detection of harmful intrusions,
 that threaten your information security and hence - your
                         business.
Value Proposition
Coverage
                         Scale with SaaS
Participates in every aspect of   Pay-as-you-Go, enables the
security in the infrastructure    smallest and accelerates the
and controls the critical         largest. In failure throw us out
components itself.
               without losing money or sleep
                 
Assurance
                        Deliverables
Our process jives with our        We provide attackers as
research and we are bold          actionable items, we worry
enough to talk about it. Yes we   about being accurate and while
take penalties.
                  you watch our KRA’s.
                 
         We sell you the juice and not the juicer !
Architecture
                Dedicated detection and
                correlation engines for each
                customer
                
                All transactional log data and
                threat information remain
                within the enterprise network
                
                UNET the central intelligence
                processing unit is responsible
                for real-time intelligence
                exchange between customers
                
                Application integration for
                premium customers shortens
                the detection span for attacks
                	
  
Use Cases
Enterprise
                          Small Enterprise
Largest scale, with multiple        Download an image from the
distributed zones across the        web, setup your systems, sign
globe can now be managed            up – pay and be security
from a single analysis console.
    delivered.
                
Micro Enterprise
                    Security Providers
Signup with a cloud provider,       Opportunity to deliver a valued
initiate an instance and watch      service to existing customers.
what’s flying around. It’s all       It’s also additional billing on the
integrated and connected.
          existing team.
                 
   One that fits your size, and grows with you… including payments
Key Factors
Cloud Security
                    Software-as-a-Service
With the market shifting rapidly   The wide acceptance of SaaS
to cloud services, security and    has re-energized the industry
monitoring on the cloud has        and we are now poised to roll
become top priority
               out Security-as-a-Service
                
Enterprise Demand
                 Leverage
The increasing demand for          Cloud players looking to put
greater visibility of the threat   together a bouquet of services
landscape has doubled the          that can be plug and play and
need for real solutions 
          can bring additional revenue
Competitive Advantage
New Market
                         Technology
Real-time attack detection as a     Investments in detection
service has been offered for the    technologies and integration
first time, and therefore NM         techniques forms a time
has the first movers advantage
      consuming entry barrier
                
Comprehensiveness
                  Collaborative Advantage
             
It’s a challenge to cover all the   More customers, more the
bases in security, and NM has       intelligence and increased
successfully run operations for     accuracy, existing customers
years doing just that
              help attract others
                
   Only CNAM can provide a wide base of real-time event threads
The Lineup, Features and Distinct Advantages

THE PRODUCT
Product Lineup
                                    COMPREHENSIVE NETWORK ATTACK MONITORING



  Managed Intrusion Detection
   Managed Threat Correlation
              UNET Intelligence
 Web Analysis Console (CARD)
         Device Log Integration
        -­‐	
  
Application Security Integration
       -­‐	
             -­‐	
  
             Target Customers
 Micro Enterprise
   Small Enterprise
   Enterprise
               NM Involvement
         Nil
              Nil
          Strategic
                   Deployment
      Automated
       Automated
         Manual
    Support by (partners / self)
    Partners
         Partners
         Both
Revenue Model
Simple Licensing
                Pay-per-Use
Customers are billed only for    Customers can start easy
the amount of data that is       without any capital investment,
sanitized by CNAM e.g. the       and the option of an easy
usage of their Internet link
    disengagement 

Incident Handling
               Premium Service
          
Assisting customers in           Customers who opt for the
recovering from attacks in the   premium service have an
shortest possible time and       additional variable added to the
being able to deliver accurate   billing depending upon the
analysis with evidence on the    number of applications
source of attack
                integrated into CNAM
Pricing
Bandwidth Billing
                 Estimation Benefits
Customers are comfortable          Easy for partners to estimate
with the usage metrics of          usage of the customer,
bandwidth, the same metrics        everyone knows their
are used to license CNAM
          bandwidth usage
                
Relativity
                        Sequential Scale
    
Number of devices and their        The pricing model does not
corresponding events per           require the customer to choose
second is directly proportionate   a usage bracket, discounts are
to the bandwidth used
             automatically applied on usage
THANK YOU!!


     CONTACT
  sales@netmonastery.com
      +91 22 40111911
  http://netmonastery.com

More Related Content

What's hot

Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
Amazon Web Services
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentationAndrew Wong
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012Agora Group
 
טכנולוגיות אבטחת מערכות מידע
טכנולוגיות אבטחת מערכות מידעטכנולוגיות אבטחת מערכות מידע
טכנולוגיות אבטחת מערכות מידע
Israel Export Institute_מכון היצוא
 
Event & Action Manager
Event & Action ManagerEvent & Action Manager
Event & Action Manager
Evam Streaming Analytics
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systems
Zsolt Nemeth
 
Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)
sonnysonare
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
1CloudRoad.com
 
TrendMicro
TrendMicroTrendMicro
TrendMicro
1CloudRoad.com
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defenseZsolt Nemeth
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
UNIT4 IT Solutions
 
Net motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_psNet motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_psAccenture
 
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderCase Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
Armor
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
Internap
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Ingram Micro Cloud
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
Testing cloud services - EuroSTAR
Testing cloud services - EuroSTARTesting cloud services - EuroSTAR
Testing cloud services - EuroSTAR
Jeroen Mengerink
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
Mike Rizzo
 
Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014
Ricardo Resnik
 

What's hot (20)

Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
 
טכנולוגיות אבטחת מערכות מידע
טכנולוגיות אבטחת מערכות מידעטכנולוגיות אבטחת מערכות מידע
טכנולוגיות אבטחת מערכות מידע
 
Event & Action Manager
Event & Action ManagerEvent & Action Manager
Event & Action Manager
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systems
 
Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 
TrendMicro
TrendMicroTrendMicro
TrendMicro
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
 
Net motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_psNet motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_ps
 
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderCase Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Testing cloud services - EuroSTAR
Testing cloud services - EuroSTARTesting cloud services - EuroSTAR
Testing cloud services - EuroSTAR
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014
 

Similar to PROFILE - NETMONASTERY

What is a Cloud-Native Application Protection Platform (CNAPP
What is a Cloud-Native Application Protection Platform (CNAPPWhat is a Cloud-Native Application Protection Platform (CNAPP
What is a Cloud-Native Application Protection Platform (CNAPP
Ciente
 
TechFai.com.pdf
TechFai.com.pdfTechFai.com.pdf
TechFai.com.pdf
TechFai
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity Trends
IRJET Journal
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
Netmagic Solutions Pvt. Ltd.
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
Netmagic Solutions Pvt. Ltd.
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPS
mmiznoni
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
harman041
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
Sysfore Technologies
 
Securing the network perimeter
Securing the network perimeterSecuring the network perimeter
Securing the network perimeter
infra-si
 
Cylance Protect-Next-Generation Antivirus-Overview
Cylance Protect-Next-Generation Antivirus-OverviewCylance Protect-Next-Generation Antivirus-Overview
Cylance Protect-Next-Generation Antivirus-Overview
Innovation Network Technologies: InNet
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
DefCamp
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Orange Business Services
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
itnewsafrica
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
Ricardo Resnik
 
Tech4biz Solutions Defending Against Cyber Threats
Tech4biz Solutions Defending Against Cyber ThreatsTech4biz Solutions Defending Against Cyber Threats
Tech4biz Solutions Defending Against Cyber Threats
yashakhandelwal2
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus Cloud
Swapna Shetye
 
AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)
IndusfacePvtLtd
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
Forcepoint LLC
 
Move your strategic applications to the cloud (June 2016)
Move your strategic applications to the cloud (June 2016)Move your strategic applications to the cloud (June 2016)
Move your strategic applications to the cloud (June 2016)
Julien SIMON
 

Similar to PROFILE - NETMONASTERY (20)

What is a Cloud-Native Application Protection Platform (CNAPP
What is a Cloud-Native Application Protection Platform (CNAPPWhat is a Cloud-Native Application Protection Platform (CNAPP
What is a Cloud-Native Application Protection Platform (CNAPP
 
TechFai.com.pdf
TechFai.com.pdfTechFai.com.pdf
TechFai.com.pdf
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity Trends
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPS
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
 
Securing the network perimeter
Securing the network perimeterSecuring the network perimeter
Securing the network perimeter
 
Cylance Protect-Next-Generation Antivirus-Overview
Cylance Protect-Next-Generation Antivirus-OverviewCylance Protect-Next-Generation Antivirus-Overview
Cylance Protect-Next-Generation Antivirus-Overview
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
Tech4biz Solutions Defending Against Cyber Threats
Tech4biz Solutions Defending Against Cyber ThreatsTech4biz Solutions Defending Against Cyber Threats
Tech4biz Solutions Defending Against Cyber Threats
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus Cloud
 
16231
1623116231
16231
 
AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Move your strategic applications to the cloud (June 2016)
Move your strategic applications to the cloud (June 2016)Move your strategic applications to the cloud (June 2016)
Move your strategic applications to the cloud (June 2016)
 

Recently uploaded

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 

PROFILE - NETMONASTERY

  • 1. Real-Time Security Monitoring Setting the benchmark for attack detection COMPANY PROFILE NetMonastery NSPL
  • 2. Executive Summary Space Definition The Situation With company data available on Online threats are increasing, the network security is an and companies are investing increasingly important area for heavily to ensure that they have most if not all organizations comprehensive protection Here We Are ! Current State NetMonastery provides an After having several of India’s online, real-time, cloud-based largest companies, as clients solution to detect and escalates NetMonastery plans to rapidly threats in real-time grow its technology lineup NetMonastery is a company providing online, real-time, network security threat detection since 2009
  • 3. NetMonastery ! Who Business An agile and courageous group Detecting attackers and their of people who innovate latest tricks in Real-time. everywhere, and also specialize Further, providing only the in computer security. actionable to a customer. Highlights Vision Secured the CWG website the Deliver effective security most attacked Indian website, solutions that define the future similarly protecting the largest and demonstrate the courage organizations across verticals. to be the change.
  • 4. Problem Statement and Current Options NEED OF THE HOUR!
  • 5. Problem Accountability Capability One organization has multiple Attack detection requires security devices managed by experience and constant different groups with no sync research. Organizations are still or accountability. struggling with their FMS. Preparedness Measurability Being available and awake is Q: How secure are you ? the first step, but delivering the A: This year we spent 2Mill on correct attack analysis at 3 am security and testing. There is is the challenge. no measuring yardstick. What we can’t measure, we can’t improve.
  • 6. Current Standards Firewalls Intrusion Prevention System The old war horse, the central Effective but plagued with false pillar of most infrastructures. alarms, require an expert Most attacks cross firewalls as resource to extract the real legit traffic and then blow up. juice. SIEM Managed Security Providers Cost is the first entry barrier, an Put all of the above in a box expert team is the second. You and delivered as a service. Have can buy a jumbo but you will been reduced to managers of still need a pilot to fly it ! the above, no value add… Timely, Accurate, Actionable and Affordable are the keys that are missing
  • 7. Solution, Service and Value Proposition ATTACK DETECTION
  • 8. Intro CNAM CNAM is an efficient and quickly deployable solution for guarding your IT system and offers round-the-clock monitoring and real-time detection of harmful intrusions, that threaten your information security and hence - your business.
  • 9. Value Proposition Coverage Scale with SaaS Participates in every aspect of Pay-as-you-Go, enables the security in the infrastructure smallest and accelerates the and controls the critical largest. In failure throw us out components itself. without losing money or sleep Assurance Deliverables Our process jives with our We provide attackers as research and we are bold actionable items, we worry enough to talk about it. Yes we about being accurate and while take penalties. you watch our KRA’s. We sell you the juice and not the juicer !
  • 10. Architecture Dedicated detection and correlation engines for each customer All transactional log data and threat information remain within the enterprise network UNET the central intelligence processing unit is responsible for real-time intelligence exchange between customers Application integration for premium customers shortens the detection span for attacks  
  • 11. Use Cases Enterprise Small Enterprise Largest scale, with multiple Download an image from the distributed zones across the web, setup your systems, sign globe can now be managed up – pay and be security from a single analysis console. delivered. Micro Enterprise Security Providers Signup with a cloud provider, Opportunity to deliver a valued initiate an instance and watch service to existing customers. what’s flying around. It’s all It’s also additional billing on the integrated and connected. existing team. One that fits your size, and grows with you… including payments
  • 12. Key Factors Cloud Security Software-as-a-Service With the market shifting rapidly The wide acceptance of SaaS to cloud services, security and has re-energized the industry monitoring on the cloud has and we are now poised to roll become top priority out Security-as-a-Service Enterprise Demand Leverage The increasing demand for Cloud players looking to put greater visibility of the threat together a bouquet of services landscape has doubled the that can be plug and play and need for real solutions can bring additional revenue
  • 13. Competitive Advantage New Market Technology Real-time attack detection as a Investments in detection service has been offered for the technologies and integration first time, and therefore NM techniques forms a time has the first movers advantage consuming entry barrier Comprehensiveness Collaborative Advantage It’s a challenge to cover all the More customers, more the bases in security, and NM has intelligence and increased successfully run operations for accuracy, existing customers years doing just that help attract others Only CNAM can provide a wide base of real-time event threads
  • 14. The Lineup, Features and Distinct Advantages THE PRODUCT
  • 15. Product Lineup COMPREHENSIVE NETWORK ATTACK MONITORING Managed Intrusion Detection Managed Threat Correlation UNET Intelligence Web Analysis Console (CARD) Device Log Integration -­‐   Application Security Integration -­‐   -­‐   Target Customers Micro Enterprise Small Enterprise Enterprise NM Involvement Nil Nil Strategic Deployment Automated Automated Manual Support by (partners / self) Partners Partners Both
  • 16. Revenue Model Simple Licensing Pay-per-Use Customers are billed only for Customers can start easy the amount of data that is without any capital investment, sanitized by CNAM e.g. the and the option of an easy usage of their Internet link disengagement Incident Handling Premium Service Assisting customers in Customers who opt for the recovering from attacks in the premium service have an shortest possible time and additional variable added to the being able to deliver accurate billing depending upon the analysis with evidence on the number of applications source of attack integrated into CNAM
  • 17. Pricing Bandwidth Billing Estimation Benefits Customers are comfortable Easy for partners to estimate with the usage metrics of usage of the customer, bandwidth, the same metrics everyone knows their are used to license CNAM bandwidth usage Relativity Sequential Scale Number of devices and their The pricing model does not corresponding events per require the customer to choose second is directly proportionate a usage bracket, discounts are to the bandwidth used automatically applied on usage
  • 18. THANK YOU!! CONTACT sales@netmonastery.com +91 22 40111911 http://netmonastery.com