SlideShare a Scribd company logo
1 of 16
Intelligence & SaaS based                    cyber crime defense Detects cyber borne malware                           already installed on your systems,            gone undetected by your other security measures, based on pin-pointed intelligence gained directly from the hostile Botnets – with no need for any S/W nor H/W installation & integration!
[object Object]
 Identify your specific cyber adversaries in real time
 Gain accurate visibility to compromised assets
 Maximize your IT security investment & efficiencies
 Prevent business interruption
 Enjoy cloud-based security SaaS advantages
No False Positive, no S/W and H/W installationSeculert'sintelligentCyberThreat Managementsolution@ a glance Confidential, Proprietary of Seculert, all rights reserved 2
Agenda The problem The challenge The solution How it works Key solution’s advantages About Seculert 3 Confidential, Proprietary of Seculert, all rights reserved
The problem Cyber crime is ‘the new frontier’ “3% to 5% percent of PCs in most Fortune 1000 organizations have bad clients already installed in them, and these are well-protected PC's.” – John Pescatore, Gartner Asymmetric battle Cyber-borne assaults evolve faster than respective countermeasure Cyber crime impact is devastating to online-based enterprises From business interruption to document theft, data base destruction, and reputation damages Traditional IT security methodologies are not enough Confidential, Proprietary of Seculert, all rights reserved 4
The challenge Apply dynamic cyber-specific security measures on par with the fast evolving cyber-crime technologies Install out-bound cyber security applications that complement and easily-integrate with existing in-bound IT security infrastructure Leverage investment in existing perimeter security systems, reinforcing efficiencies and avoiding ‘green field’ expenditure Be able to respond to evolving threats in real time Pin-point specific source of cyber crime events and defend against reoccurring penetration & leakage Customized reporting and alerts to specific organizational needs 5 Confidential, Proprietary of Seculert, all rights reserved
The solution Intelligence-based out-bound methodology Cloud-based Cyber Threat Management service that minimizes business risks and potential losses by providing real-time detection of cybercrime events  SaaS model offers optimized operation & Capex Seculert'spatent-pending technology detects the broadest possible array of malware threats Gathers & analyzes intelligence from multiple sensors  Identifies malicious content, specific hostile servers & Botnets Pin-points corporate-specific attacks Alerts to specific organizational assets that were compromised 6 Confidential, Proprietary of Seculert, all rights reserved
[object Object]
Seculert focuses on incidents discovery outside the corporate network (stolen data, bots, malware)USAToday.com CBS.com C&C server The Web C&C server Antivirus, URL filtering, Proxy, IPS etc. Out-bound cyber threat detection
How it works Instant access: To apply the service, all clients have  to do is just enter their domains’ URLs!  Seculert's cloud-based patent-pending cyber threat detectiontechnology requires no software nor hardware installation, enabling: Consolidation of Comprehensive coverage of broad array of cyber threats Round-the-clock research and information gathering  Data unification of diverse inputs from multiple sources including respective Botnets Analysis of All types of threats including those without known signatures  Notification of Real-time & detailed alerts of all cyber threat incidents  Customized reporting  Comprehensive, easy-to-use Security-as-a-Service dashboard Executive-level cyber threat trends reports  Real-time reporting of affected corporate assets  8 Confidential, Proprietary of Seculert, all rights reserved
Customized dashboard 9 Confidential, Proprietary of Seculert, all rights reserved

More Related Content

What's hot

Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
LIFT OFF 2017: AWS and Cloud Computing
LIFT OFF 2017: AWS and Cloud ComputingLIFT OFF 2017: AWS and Cloud Computing
LIFT OFF 2017: AWS and Cloud ComputingRobert Herjavec
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceCamilo Fandiño Gómez
 
Data Protection & Shadow IT in a cloud era
Data Protection & Shadow IT in a cloud eraData Protection & Shadow IT in a cloud era
Data Protection & Shadow IT in a cloud eraDavid De Vos
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​AlgoSec
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistJignesh Solanki
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportIftikhar Ali Iqbal
 
LIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityLIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityRobert Herjavec
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...YouAttestSlideshare
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityCentrify Corporation
 
Overview of Google’s BeyondCorp Approach to Security
 Overview of Google’s BeyondCorp Approach to Security Overview of Google’s BeyondCorp Approach to Security
Overview of Google’s BeyondCorp Approach to SecurityPriyanka Aash
 
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...Symantec
 
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust NothingMark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust NothingPro Mrkt
 
BeyondCorp - Google Security for Everyone Else
BeyondCorp  - Google Security for Everyone ElseBeyondCorp  - Google Security for Everyone Else
BeyondCorp - Google Security for Everyone ElseIvan Dwyer
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Andris Soroka
 

What's hot (19)

Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
LIFT OFF 2017: AWS and Cloud Computing
LIFT OFF 2017: AWS and Cloud ComputingLIFT OFF 2017: AWS and Cloud Computing
LIFT OFF 2017: AWS and Cloud Computing
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security Intelligence
 
Data Protection & Shadow IT in a cloud era
Data Protection & Shadow IT in a cloud eraData Protection & Shadow IT in a cloud era
Data Protection & Shadow IT in a cloud era
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
IBM QRadar Xforce
IBM QRadar XforceIBM QRadar Xforce
IBM QRadar Xforce
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise Checklist
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
 
LIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityLIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming Security
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
 
Overview of Google’s BeyondCorp Approach to Security
 Overview of Google’s BeyondCorp Approach to Security Overview of Google’s BeyondCorp Approach to Security
Overview of Google’s BeyondCorp Approach to Security
 
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
 
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust NothingMark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
 
BeyondCorp - Google Security for Everyone Else
BeyondCorp  - Google Security for Everyone ElseBeyondCorp  - Google Security for Everyone Else
BeyondCorp - Google Security for Everyone Else
 
IBM Security SaaS IaaS and PaaS
IBM Security SaaS IaaS and PaaSIBM Security SaaS IaaS and PaaS
IBM Security SaaS IaaS and PaaS
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
 

Similar to Seculert presentation

Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...Criminal IP
 
Presentation data security solutions certified ibm business partner for ibm...
Presentation   data security solutions certified ibm business partner for ibm...Presentation   data security solutions certified ibm business partner for ibm...
Presentation data security solutions certified ibm business partner for ibm...xKinAnx
 
Fidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception SolutionFidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception SolutionFidelis Cybersecurity
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqriteseo
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesSymantec
 
Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011Atlantic Security Conference
 
Tips and Tricks - Best Practices for Threat Detection and Response - 2021-08...
Tips and Tricks - Best Practices for Threat Detection and Response  - 2021-08...Tips and Tricks - Best Practices for Threat Detection and Response  - 2021-08...
Tips and Tricks - Best Practices for Threat Detection and Response - 2021-08...ssuserf862eb
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdfMetaorange
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptxMetaorange
 
The ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expertThe ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expertChapter247 Infotech
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyCloudflare
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarIBM Security
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat managementRajendra Menon
 

Similar to Seculert presentation (20)

Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
 
Presentation data security solutions certified ibm business partner for ibm...
Presentation   data security solutions certified ibm business partner for ibm...Presentation   data security solutions certified ibm business partner for ibm...
Presentation data security solutions certified ibm business partner for ibm...
 
Fidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception SolutionFidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception Solution
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
 
Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011
 
Tips and Tricks - Best Practices for Threat Detection and Response - 2021-08...
Tips and Tricks - Best Practices for Threat Detection and Response  - 2021-08...Tips and Tricks - Best Practices for Threat Detection and Response  - 2021-08...
Tips and Tricks - Best Practices for Threat Detection and Response - 2021-08...
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
DDoS Report.docx
DDoS Report.docxDDoS Report.docx
DDoS Report.docx
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
The ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expertThe ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expert
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
TSS_Overview
TSS_OverviewTSS_Overview
TSS_Overview
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud Journey
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
Mitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-RadarMitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-Radar
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
 

More from themarker

תעסוקה
תעסוקהתעסוקה
תעסוקהthemarker
 
הערבות
הערבותהערבות
הערבותthemarker
 
פרוייקט כלכלי
פרוייקט כלכליפרוייקט כלכלי
פרוייקט כלכליthemarker
 
מסה קריטית ושינוי חברתי
מסה קריטית ושינוי חברתימסה קריטית ושינוי חברתי
מסה קריטית ושינוי חברתיthemarker
 
חברתי חברה בריאה
חברתי חברה בריאהחברתי חברה בריאה
חברתי חברה בריאהthemarker
 
נעמי רמתי
נעמי רמתינעמי רמתי
נעמי רמתיthemarker
 
לבטחון תזונתי
לבטחון תזונתילבטחון תזונתי
לבטחון תזונתיthemarker
 
ועידת ישראל דה מארקר 1.8
ועידת ישראל דה מארקר 1.8ועידת ישראל דה מארקר 1.8
ועידת ישראל דה מארקר 1.8themarker
 
לגליזציה עכשיו
לגליזציה עכשיולגליזציה עכשיו
לגליזציה עכשיוthemarker
 
לשיפור בישראל2
לשיפור בישראל2לשיפור בישראל2
לשיפור בישראל2themarker
 
לשיפור החיים בישראל1
לשיפור החיים בישראל1לשיפור החיים בישראל1
לשיפור החיים בישראל1themarker
 
אלוני עפר ועידת ישראל דה מארקר 1.8
אלוני עפר   ועידת ישראל דה מארקר 1.8אלוני עפר   ועידת ישראל דה מארקר 1.8
אלוני עפר ועידת ישראל דה מארקר 1.8themarker
 
improve life
improve lifeimprove life
improve lifethemarker
 
לשיפור החיים בישראל
לשיפור החיים בישראללשיפור החיים בישראל
לשיפור החיים בישראלthemarker
 
לבן עבודה שחורה
לבן עבודה שחורהלבן עבודה שחורה
לבן עבודה שחורהthemarker
 
In4 adeal 2010
In4 adeal 2010In4 adeal 2010
In4 adeal 2010themarker
 
תעסוקה למגזר החרדי
תעסוקה למגזר החרדיתעסוקה למגזר החרדי
תעסוקה למגזר החרדיthemarker
 

More from themarker (20)

תעסוקה
תעסוקהתעסוקה
תעסוקה
 
הערבות
הערבותהערבות
הערבות
 
פרוייקט כלכלי
פרוייקט כלכליפרוייקט כלכלי
פרוייקט כלכלי
 
מסה קריטית ושינוי חברתי
מסה קריטית ושינוי חברתימסה קריטית ושינוי חברתי
מסה קריטית ושינוי חברתי
 
חברתי חברה בריאה
חברתי חברה בריאהחברתי חברה בריאה
חברתי חברה בריאה
 
נעמי רמתי
נעמי רמתינעמי רמתי
נעמי רמתי
 
Jvolution
JvolutionJvolution
Jvolution
 
ציבור
ציבורציבור
ציבור
 
ציבור
ציבורציבור
ציבור
 
לבטחון תזונתי
לבטחון תזונתילבטחון תזונתי
לבטחון תזונתי
 
ועידת ישראל דה מארקר 1.8
ועידת ישראל דה מארקר 1.8ועידת ישראל דה מארקר 1.8
ועידת ישראל דה מארקר 1.8
 
לגליזציה עכשיו
לגליזציה עכשיולגליזציה עכשיו
לגליזציה עכשיו
 
לשיפור בישראל2
לשיפור בישראל2לשיפור בישראל2
לשיפור בישראל2
 
לשיפור החיים בישראל1
לשיפור החיים בישראל1לשיפור החיים בישראל1
לשיפור החיים בישראל1
 
אלוני עפר ועידת ישראל דה מארקר 1.8
אלוני עפר   ועידת ישראל דה מארקר 1.8אלוני עפר   ועידת ישראל דה מארקר 1.8
אלוני עפר ועידת ישראל דה מארקר 1.8
 
improve life
improve lifeimprove life
improve life
 
לשיפור החיים בישראל
לשיפור החיים בישראללשיפור החיים בישראל
לשיפור החיים בישראל
 
לבן עבודה שחורה
לבן עבודה שחורהלבן עבודה שחורה
לבן עבודה שחורה
 
In4 adeal 2010
In4 adeal 2010In4 adeal 2010
In4 adeal 2010
 
תעסוקה למגזר החרדי
תעסוקה למגזר החרדיתעסוקה למגזר החרדי
תעסוקה למגזר החרדי
 

Seculert presentation

  • 1. Intelligence & SaaS based cyber crime defense Detects cyber borne malware already installed on your systems, gone undetected by your other security measures, based on pin-pointed intelligence gained directly from the hostile Botnets – with no need for any S/W nor H/W installation & integration!
  • 2.
  • 3. Identify your specific cyber adversaries in real time
  • 4. Gain accurate visibility to compromised assets
  • 5. Maximize your IT security investment & efficiencies
  • 6. Prevent business interruption
  • 7. Enjoy cloud-based security SaaS advantages
  • 8. No False Positive, no S/W and H/W installationSeculert'sintelligentCyberThreat Managementsolution@ a glance Confidential, Proprietary of Seculert, all rights reserved 2
  • 9. Agenda The problem The challenge The solution How it works Key solution’s advantages About Seculert 3 Confidential, Proprietary of Seculert, all rights reserved
  • 10. The problem Cyber crime is ‘the new frontier’ “3% to 5% percent of PCs in most Fortune 1000 organizations have bad clients already installed in them, and these are well-protected PC's.” – John Pescatore, Gartner Asymmetric battle Cyber-borne assaults evolve faster than respective countermeasure Cyber crime impact is devastating to online-based enterprises From business interruption to document theft, data base destruction, and reputation damages Traditional IT security methodologies are not enough Confidential, Proprietary of Seculert, all rights reserved 4
  • 11. The challenge Apply dynamic cyber-specific security measures on par with the fast evolving cyber-crime technologies Install out-bound cyber security applications that complement and easily-integrate with existing in-bound IT security infrastructure Leverage investment in existing perimeter security systems, reinforcing efficiencies and avoiding ‘green field’ expenditure Be able to respond to evolving threats in real time Pin-point specific source of cyber crime events and defend against reoccurring penetration & leakage Customized reporting and alerts to specific organizational needs 5 Confidential, Proprietary of Seculert, all rights reserved
  • 12. The solution Intelligence-based out-bound methodology Cloud-based Cyber Threat Management service that minimizes business risks and potential losses by providing real-time detection of cybercrime events SaaS model offers optimized operation & Capex Seculert'spatent-pending technology detects the broadest possible array of malware threats Gathers & analyzes intelligence from multiple sensors Identifies malicious content, specific hostile servers & Botnets Pin-points corporate-specific attacks Alerts to specific organizational assets that were compromised 6 Confidential, Proprietary of Seculert, all rights reserved
  • 13.
  • 14. Seculert focuses on incidents discovery outside the corporate network (stolen data, bots, malware)USAToday.com CBS.com C&C server The Web C&C server Antivirus, URL filtering, Proxy, IPS etc. Out-bound cyber threat detection
  • 15. How it works Instant access: To apply the service, all clients have to do is just enter their domains’ URLs! Seculert's cloud-based patent-pending cyber threat detectiontechnology requires no software nor hardware installation, enabling: Consolidation of Comprehensive coverage of broad array of cyber threats Round-the-clock research and information gathering Data unification of diverse inputs from multiple sources including respective Botnets Analysis of All types of threats including those without known signatures Notification of Real-time & detailed alerts of all cyber threat incidents Customized reporting Comprehensive, easy-to-use Security-as-a-Service dashboard Executive-level cyber threat trends reports Real-time reporting of affected corporate assets 8 Confidential, Proprietary of Seculert, all rights reserved
  • 16. Customized dashboard 9 Confidential, Proprietary of Seculert, all rights reserved
  • 17. Real time cyber threat monitoring 10 Confidential, Proprietary of Seculert, all rights reserved
  • 18. Criminal servers detection 11 Confidential, Proprietary of Seculert, all rights reserved
  • 19. Seculert – Application Programming Interface SeculertAPI allows customers to interact in real-time with its service and realize the risk associated with any IP address connecting to the corporate network/service Use cases: DDoS Defense Inflating Cloud Computing environment IP credibility based Access Control Confidential, Proprietary of Seculert, all rights reserved 12
  • 20. Key solution’s advantages 1 Real-time & dynamic blocking of hostile servers Identify & rank specific security vulnerabilities used by active hackers Maximized ROI: Enabling allocation of security budget & focus to address only specific & validated vulnerabilities and gaps Accurate reports of any compromised corporate assets & domains including respective offender’s identify Tailored & customized dashboard Low impact & fast service integration: No S/W nor H/W installation required Customer need only to enter their corporate domains details to create their account instantly! 13 Confidential, Proprietary of Seculert, all rights reserved
  • 21. Key solution’s advantages 2 Real-time remote monitoring Customized reports to all stake holders: From executive management Assigned IT personnel Forwarding notification of criminal events to law enforcement authorities Real-time, dynamic & on demand vulnerabilities status report Avoid losing business opportunities when partners’ sites block your corporate domain if evaluated as unsafe 14 Confidential, Proprietary of Seculert, all rights reserved
  • 22. About Seculert Strong executive management team with proven Enterprise record Extensive industry-specific experience Check Point , RSA , M86 , Finjan, Paradigm, SanDisk , Amdocs Patent-pending innovative IP Sound financial backing 15 Confidential, Proprietary of Seculert, all rights reserved
  • 23. Thank you Confidential, Proprietary of Seculert, all rights reserved 16