Successfully reported this slideshow.

Seculert presentation


Published on

  • Be the first to comment

  • Be the first to like this

Seculert presentation

  1. 1. Intelligence & SaaS based cyber crime defense<br />Detects cyber borne malware already installed on your systems, gone undetected by your other security measures, based on pin-pointed intelligence gained directly from the hostile Botnets – with no need for any S/W nor H/W installation & integration!<br />
  2. 2. <ul><li>Seal your domain against cyber penetration & leakage
  3. 3. Identify your specific cyber adversaries in real time
  4. 4. Gain accurate visibility to compromised assets
  5. 5. Maximize your IT security investment & efficiencies
  6. 6. Prevent business interruption
  7. 7. Enjoy cloud-based security SaaS advantages
  8. 8. No False Positive, no S/W and H/W installation</li></ul>Seculert'sintelligentCyberThreat Managementsolution@ a glance<br />Confidential, Proprietary of Seculert, all rights reserved<br />2<br />
  9. 9. Agenda<br />The problem<br />The challenge<br />The solution<br />How it works<br />Key solution’s advantages<br />About Seculert<br />3<br />Confidential, Proprietary of Seculert, all rights reserved<br />
  10. 10. The problem<br />Cyber crime is ‘the new frontier’<br />“3% to 5% percent of PCs in most Fortune 1000 organizations have bad clients already installed in them, and these are well-protected PC's.” – John Pescatore, Gartner<br />Asymmetric battle<br />Cyber-borne assaults evolve faster than respective countermeasure<br />Cyber crime impact is devastating to online-based enterprises<br />From business interruption to document theft, data base destruction, and reputation damages<br />Traditional IT security methodologies are not enough<br />Confidential, Proprietary of Seculert, all rights reserved<br />4<br />
  11. 11. The challenge<br />Apply dynamic cyber-specific security measures on par with the fast evolving cyber-crime technologies<br />Install out-bound cyber security applications that complement and easily-integrate with existing in-bound IT security infrastructure<br />Leverage investment in existing perimeter security systems, reinforcing efficiencies and avoiding ‘green field’ expenditure<br />Be able to respond to evolving threats in real time<br />Pin-point specific source of cyber crime events and defend against reoccurring penetration & leakage<br />Customized reporting and alerts to specific organizational needs<br />5<br />Confidential, Proprietary of Seculert, all rights reserved<br />
  12. 12. The solution<br />Intelligence-based out-bound methodology<br />Cloud-based Cyber Threat Management service that minimizes business risks and potential losses by providing real-time detection of cybercrime events <br />SaaS model offers optimized operation & Capex<br />Seculert'spatent-pending technology detects the broadest possible array of malware threats<br />Gathers & analyzes intelligence from multiple sensors <br />Identifies malicious content, specific hostile servers & Botnets<br />Pin-points corporate-specific attacks<br />Alerts to specific organizational assets that were compromised<br />6<br />Confidential, Proprietary of Seculert, all rights reserved<br />
  13. 13. <ul><li>Traditional security products & services focus on protecting the network from the perimeter inward
  14. 14. Seculert focuses on incidents discovery outside the corporate network (stolen data, bots, malware)</li></ul><br /><br />C&C server<br />The Web<br />C&C server<br />Antivirus, URL filtering, Proxy, IPS etc.<br />Out-bound cyber threat detection<br />
  15. 15. How it works<br />Instant access: To apply the service, all clients have <br />to do is just enter their domains’ URLs! <br />Seculert's cloud-based patent-pending cyber threat detectiontechnology requires no software nor hardware installation, enabling:<br />Consolidation of<br />Comprehensive coverage of broad array of cyber threats<br />Round-the-clock research and information gathering <br />Data unification of diverse inputs from multiple sources including respective Botnets<br />Analysis of<br />All types of threats including those without known signatures <br />Notification of<br />Real-time & detailed alerts of all cyber threat incidents <br />Customized reporting <br />Comprehensive, easy-to-use Security-as-a-Service dashboard<br />Executive-level cyber threat trends reports <br />Real-time reporting of affected corporate assets <br />8<br />Confidential, Proprietary of Seculert, all rights reserved<br />
  16. 16. Customized dashboard<br />9<br />Confidential, Proprietary of Seculert, all rights reserved<br />
  17. 17. Real time cyber threat monitoring<br />10<br />Confidential, Proprietary of Seculert, all rights reserved<br />
  18. 18. Criminal servers detection<br />11<br />Confidential, Proprietary of Seculert, all rights reserved<br />
  19. 19. Seculert – Application Programming Interface <br />SeculertAPI allows customers to interact in real-time with its service and realize the risk associated with any IP address connecting to the corporate network/service<br />Use cases: <br />DDoS Defense<br />Inflating Cloud Computing environment <br />IP credibility based Access Control <br />Confidential, Proprietary of Seculert, all rights reserved<br />12<br />
  20. 20. Key solution’s advantages 1<br />Real-time & dynamic blocking of hostile servers<br />Identify & rank specific security vulnerabilities used by active hackers<br />Maximized ROI: <br />Enabling allocation of security budget & focus to address only specific & validated vulnerabilities and gaps<br />Accurate reports of any compromised corporate assets & domains including respective offender’s identify<br />Tailored & customized dashboard <br />Low impact & fast service integration:<br />No S/W nor H/W installation required<br />Customer need only to enter their corporate domains details to create their account instantly!<br />13<br />Confidential, Proprietary of Seculert, all rights reserved<br />
  21. 21. Key solution’s advantages 2<br />Real-time remote monitoring<br />Customized reports to all stake holders:<br />From executive management<br />Assigned IT personnel<br />Forwarding notification of criminal events to law enforcement authorities<br />Real-time, dynamic & on demand vulnerabilities status report<br />Avoid losing business opportunities when partners’ sites block your corporate domain if evaluated as unsafe<br />14<br />Confidential, Proprietary of Seculert, all rights reserved<br />
  22. 22. About Seculert<br />Strong executive management team<br />with proven Enterprise record<br />Extensive industry-specific experience<br />Check Point , RSA , M86 , Finjan, Paradigm, SanDisk , Amdocs <br />Patent-pending innovative IP<br />Sound financial backing<br />15<br />Confidential, Proprietary of Seculert, all rights reserved<br />
  23. 23. Thank you<br />Confidential, Proprietary of Seculert, all rights reserved<br />16<br />