1. Intelligence & SaaS based cyber crime defense Detects cyber borne malware already installed on your systems, gone undetected by your other security measures, based on pin-pointed intelligence gained directly from the hostile Botnets – with no need for any S/W nor H/W installation & integration!
8. No False Positive, no S/W and H/W installationSeculert'sintelligentCyberThreat Managementsolution@ a glance Confidential, Proprietary of Seculert, all rights reserved 2
9. Agenda The problem The challenge The solution How it works Key solution’s advantages About Seculert 3 Confidential, Proprietary of Seculert, all rights reserved
10. The problem Cyber crime is ‘the new frontier’ “3% to 5% percent of PCs in most Fortune 1000 organizations have bad clients already installed in them, and these are well-protected PC's.” – John Pescatore, Gartner Asymmetric battle Cyber-borne assaults evolve faster than respective countermeasure Cyber crime impact is devastating to online-based enterprises From business interruption to document theft, data base destruction, and reputation damages Traditional IT security methodologies are not enough Confidential, Proprietary of Seculert, all rights reserved 4
11. The challenge Apply dynamic cyber-specific security measures on par with the fast evolving cyber-crime technologies Install out-bound cyber security applications that complement and easily-integrate with existing in-bound IT security infrastructure Leverage investment in existing perimeter security systems, reinforcing efficiencies and avoiding ‘green field’ expenditure Be able to respond to evolving threats in real time Pin-point specific source of cyber crime events and defend against reoccurring penetration & leakage Customized reporting and alerts to specific organizational needs 5 Confidential, Proprietary of Seculert, all rights reserved
12. The solution Intelligence-based out-bound methodology Cloud-based Cyber Threat Management service that minimizes business risks and potential losses by providing real-time detection of cybercrime events SaaS model offers optimized operation & Capex Seculert'spatent-pending technology detects the broadest possible array of malware threats Gathers & analyzes intelligence from multiple sensors Identifies malicious content, specific hostile servers & Botnets Pin-points corporate-specific attacks Alerts to specific organizational assets that were compromised 6 Confidential, Proprietary of Seculert, all rights reserved
13.
14. Seculert focuses on incidents discovery outside the corporate network (stolen data, bots, malware)USAToday.com CBS.com C&C server The Web C&C server Antivirus, URL filtering, Proxy, IPS etc. Out-bound cyber threat detection
15. How it works Instant access: To apply the service, all clients have to do is just enter their domains’ URLs! Seculert's cloud-based patent-pending cyber threat detectiontechnology requires no software nor hardware installation, enabling: Consolidation of Comprehensive coverage of broad array of cyber threats Round-the-clock research and information gathering Data unification of diverse inputs from multiple sources including respective Botnets Analysis of All types of threats including those without known signatures Notification of Real-time & detailed alerts of all cyber threat incidents Customized reporting Comprehensive, easy-to-use Security-as-a-Service dashboard Executive-level cyber threat trends reports Real-time reporting of affected corporate assets 8 Confidential, Proprietary of Seculert, all rights reserved
19. Seculert – Application Programming Interface SeculertAPI allows customers to interact in real-time with its service and realize the risk associated with any IP address connecting to the corporate network/service Use cases: DDoS Defense Inflating Cloud Computing environment IP credibility based Access Control Confidential, Proprietary of Seculert, all rights reserved 12
20. Key solution’s advantages 1 Real-time & dynamic blocking of hostile servers Identify & rank specific security vulnerabilities used by active hackers Maximized ROI: Enabling allocation of security budget & focus to address only specific & validated vulnerabilities and gaps Accurate reports of any compromised corporate assets & domains including respective offender’s identify Tailored & customized dashboard Low impact & fast service integration: No S/W nor H/W installation required Customer need only to enter their corporate domains details to create their account instantly! 13 Confidential, Proprietary of Seculert, all rights reserved
21. Key solution’s advantages 2 Real-time remote monitoring Customized reports to all stake holders: From executive management Assigned IT personnel Forwarding notification of criminal events to law enforcement authorities Real-time, dynamic & on demand vulnerabilities status report Avoid losing business opportunities when partners’ sites block your corporate domain if evaluated as unsafe 14 Confidential, Proprietary of Seculert, all rights reserved
22. About Seculert Strong executive management team with proven Enterprise record Extensive industry-specific experience Check Point , RSA , M86 , Finjan, Paradigm, SanDisk , Amdocs Patent-pending innovative IP Sound financial backing 15 Confidential, Proprietary of Seculert, all rights reserved