SlideShare a Scribd company logo
1 of 15
Marlabs
Cyber Threat Management Services




          © 2012 Marlabs Inc. Proprietary and Confidential
About Marlabs



  Steady Growth                                                Global Footprint

   • Founded in 1996                                             • US-centric operations with seamlessly integrated onsite and
   • 2,000+ employees                                              offshore teams

   • Consistent year-on-year revenue growth                      • Headquarters in Piscataway , NJ - USA

   • 100+ prominent blue-chip clients across a                   • Global delivery headquarters in Bangalore, India
     wide variety of verticals including                         • Office Locations: USA - Piscataway (NJ), Bethlehem (PA);
     Citibank, Barclays, T-Mobile, Toshiba,                        India - Bangalore, Mysore, Pune, Cochin, and Trivandrum;
     Toys ''R'' Us, Reliant Energy, and the                        Mexico - Mexico City; Canada – Toronto; Malaysia - Kuala
     State of New Jersey.                                          Lumpur; Latin America




  Vertical Expertise                                               Technology Solutions

   • Airline            • Energy and Utilities                     • Cloud Computing         • Microsoft
     Services           • Government                               • Mobility                • Java
   • Healthcare         • Education                                • BI-Analytics            • Open Source
   • BFSI
                        • Retail                                   • ERP
   • Media




                                          © 2012 Marlabs Inc. Proprietary and Confidential                                 2
Service Offerings




                            Application Development and Maintenance| IT Infrastructure Services | Testing | Packaged
    SERVICES                                   Implementation & Support | Product Engineering



                                                                      Energy
                               Airline                                   &                  Govt.
    BFSI       Healthcare                         Media                                             Education             Retail
                              Services                                Utilities




                                                        VERTICALS




 TECHNOLOGY SOLUTIONS       Information Security | Cloud | Mobility | BI-Analytics| Microsoft |Java | Open Source | ERP




                                         © 2012 Marlabs Inc. Proprietary and Confidential                                    3
How to Secure a Network




          Purchase Good Firewalls, Install and Configure


          Install Intrusion Detection Systems in Network and
          Monitor


          Install Intrusion Prevention Systems Device to Protect
          against Threats


          Install Anti-Virus and Malware Prevention Software


          Install Authentication Server to Protect against
          Unauthorized Entry into Networks


          Install Encryption Process to Maintain Integrity &
          Confidentiality of Data




                                © 2012 Marlabs Inc. Proprietary and Confidential   4
Recent High-Profile Cyber Attacks



   Anonymous' Hackers Take Down Justice Department Site Over Megaupload Shutdown




                                                                    Romney Private email: Authorities
   How to Protect Yourself From Hacker Attacks                          Probe Possible Hacking
                     Abroad




                         Hackers Release Private FBI Call about Hackers




                         Is the US already Engaged in a ‘Cyber War'




                                 © 2012 Marlabs Inc. Proprietary and Confidential                       5
Security Cost to Nation




                          © 2012 Marlabs Inc. Proprietary and Confidential   6
Who is Vulnerable?




     Banks and            Internet                                                       Government
                                                            Pharmaceutical
      Financial           Service                                                        and Defense
                                                             Companies
     Institutions        Providers                                                        Agencies




               Contractors                                                      Every Man,
                   to                        Multinational                       Woman &
               Government                    Corporations                       Child using
                Agencies                                                        the Internet


                             © 2012 Marlabs Inc. Proprietary and Confidential                    7
Data Protection in the Cyber World – It’s about Managing Risk – No 100% Security




          Firewalls: Can be Bypassed



          Authentication: Can be Guessed or Attacked



          IDS Device: Lots of False Positives



          Anti-Virus: Only as Good as Last Signature


          Encryption: Cracked or Can Also Be Used By Attackers



                            © 2012 Marlabs Inc. Proprietary and Confidential   8
Marlabs Cyber Threat Management Service (CTMS) Methodology



                                                     Experienced
           Leverage Holistic
                                                       Security
           Cyber Intelligence
                                                     Professionals



                                                Early Detection of
            Near-Real-Time                       Indicators and
               Analysis                             Warnings



                              Forensically
                            Sound Evidence



                       © 2012 Marlabs Inc. Proprietary and Confidential   9
Marlabs CTMS Approach




                                   Network
                                 Surveillance -
                                   NIKSUN
                 Cyber
                Security                                      Vulnerability
                Incident                                      Assessment
              Management             Cyber
                                    Security
                                  Operations
                                     Center
                                    Holistic
                 Security         Intelligence               Log Collection
              Incident Plan                                    Correlation
              Development                                     and Analysis

                                    Security
                                    Device
                                  Management




                         © 2012 Marlabs Inc. Proprietary and Confidential     10
NIKSUN Network Surveillance Appliance – Provides Visibility




                       Making the
                       Unknown
                    “Known”

                         © 2012 Marlabs Inc. Proprietary and Confidential   11
NIKSUN Network Surveillance Appliance




                               1. Everything must be recorded



                              2. Everything must be organized



                                  3. Everything must be visible



         In real time for preemptive detection, operational
           analytics, forensic analysis – all in one device



                       © 2012 Marlabs Inc. Proprietary and Confidential   12
NIKSUN Network Surveillance Appliance

                         All Incoming/Outgoing packets, flows, etc. are non-
                       intrusively analyzed and optionally recorded -- at multi
                     gigabit rates -- in real-time to generate pertinent metadata



                                                     Enterprise-wide Metadata and
                                                     analytics are immediately accessible
                                                     for visibility, analysis, alarming and
                                                     troubleshooting

                   All raw packets and metadata are correlated,
                   indexed and stored in NIKSUN’s built-in
                   Knowledge Warehouse, creating a powerful and
                   scalable real time source of network information




         The Industry’s Only Unified, Scalable and Cost-effective
                  Holistic Security Monitoring Solution

                         © 2012 Marlabs Inc. Proprietary and Confidential                     13
NIKSUN Network Surveillance Appliance



                    Core Backbone




                                                                                            Firewall
                                                                   Internal
                                                                  Network To
                                                                   Internet                            Router          Internet



                                              Gigabit Ethernet
                         Gigabit Ethernet
           Router



                                                                 Server
        End User                                                                                                                  Supply
                                                                                  Location A                                      Chain
                                                                 Router

                                                                                                            Intranet


                                                                                                                           B2B / B2B2C
                                            Connecton
    Global                                   Network                 F/W
                                                                              Router
  Correlation                                                      Location B
  Aggregation
  Management

                                                         © 2012 Marlabs Inc. Proprietary and Confidential                                  14
Thank You




To learn more about how Marlabs can help you with
 your Cyber Security challenges, please call us at
732.694.1000 or write to us at sales@marlabs.com

           www.marlabs.com
          © 2012 Marlabs Inc. Proprietary and Confidential   15

More Related Content

What's hot

Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS UK
 
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:HyTrust
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsisVasuki Kashyap
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft Private Cloud
 
Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore! Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore! EMC
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraTrend Micro (EMEA) Limited
 
Unleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud ComputingUnleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud ComputingSam Garforth
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonUlf Mattsson
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!topseowebmaster
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youGlobal Business Events
 
Data Breach from the Inside Out
Data Breach from the Inside Out Data Breach from the Inside Out
Data Breach from the Inside Out The Lorenzi Group
 
CRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff CrumeCRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff CrumeKrisValerio
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Neira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf readyNeira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf readyNeira Jones
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)itforum-roundtable
 
IBM Social Business Development for CXOs
IBM Social Business Development for CXOsIBM Social Business Development for CXOs
IBM Social Business Development for CXOsFriedel Jonker
 

What's hot (20)

Agama Profile
Agama ProfileAgama Profile
Agama Profile
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
 
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
 
Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore! Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore!
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
 
Cloud risk management
Cloud risk managementCloud risk management
Cloud risk management
 
Unleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud ComputingUnleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud Computing
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consulting
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
Data Breach from the Inside Out
Data Breach from the Inside Out Data Breach from the Inside Out
Data Breach from the Inside Out
 
CRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff CrumeCRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff Crume
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Neira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf readyNeira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf ready
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
 
IBM Social Business Development for CXOs
IBM Social Business Development for CXOsIBM Social Business Development for CXOs
IBM Social Business Development for CXOs
 

Viewers also liked

6 rules of composition
6 rules of composition6 rules of composition
6 rules of compositionTaiSheng
 
How to build quality software
How to build quality softwareHow to build quality software
How to build quality softwareMake School
 
Six Rules of Photography Composition
Six Rules of Photography CompositionSix Rules of Photography Composition
Six Rules of Photography Compositiondrummajjason
 
ECAD MCAD Design Data Management with PTC Windchill and Cadence Allegro PCB
ECAD MCAD Design Data Management with PTC Windchill and Cadence Allegro PCBECAD MCAD Design Data Management with PTC Windchill and Cadence Allegro PCB
ECAD MCAD Design Data Management with PTC Windchill and Cadence Allegro PCBEMA Design Automation
 
Conferences i/o - Audience Engagement System
Conferences i/o - Audience Engagement SystemConferences i/o - Audience Engagement System
Conferences i/o - Audience Engagement SystemJohn Pytel
 
U.S. Live Event Attendance Study
U.S. Live Event Attendance StudyU.S. Live Event Attendance Study
U.S. Live Event Attendance StudyLiveAnalytics
 
Basics Of 3 Dimensional Design
Basics Of 3 Dimensional DesignBasics Of 3 Dimensional Design
Basics Of 3 Dimensional DesignMark Creegan
 
M2M, IoT, Device management: one protocol to rule them all? - EclipseCon 2014
M2M, IoT, Device management: one protocol to rule them all? - EclipseCon 2014M2M, IoT, Device management: one protocol to rule them all? - EclipseCon 2014
M2M, IoT, Device management: one protocol to rule them all? - EclipseCon 2014Julien Vermillard
 
Choosing the Right Trading Desk for Your Display Programmatic Buying
Choosing the Right Trading Desk for Your Display Programmatic BuyingChoosing the Right Trading Desk for Your Display Programmatic Buying
Choosing the Right Trading Desk for Your Display Programmatic BuyingAcquisio
 
Insufficienza valvolare aortica
Insufficienza valvolare aorticaInsufficienza valvolare aortica
Insufficienza valvolare aorticaICARDIOLOGI
 
Critical chain - Eliyahu goldratt
Critical chain - Eliyahu goldrattCritical chain - Eliyahu goldratt
Critical chain - Eliyahu goldrattazadiriz
 
General 1 fixatives cytology
General  1 fixatives cytologyGeneral  1 fixatives cytology
General 1 fixatives cytologyNem Shrestha
 
4G Mobile Network & Applications
4G Mobile Network & Applications4G Mobile Network & Applications
4G Mobile Network & ApplicationsKuncoro Wastuwibowo
 
Intensive Reading: Methods and Strategies
Intensive Reading: Methods and StrategiesIntensive Reading: Methods and Strategies
Intensive Reading: Methods and StrategiesIsa Agudo
 
What Is Digital Quality Management?
What Is Digital Quality Management?What Is Digital Quality Management?
What Is Digital Quality Management?Crownpeak
 
Five Generic Competitive Strategies
Five Generic Competitive StrategiesFive Generic Competitive Strategies
Five Generic Competitive StrategiesOmi Dutta
 
Interferometric modulator (imod)
Interferometric modulator (imod)Interferometric modulator (imod)
Interferometric modulator (imod)Ankita Sinha
 

Viewers also liked (20)

6 rules of composition
6 rules of composition6 rules of composition
6 rules of composition
 
How to build quality software
How to build quality softwareHow to build quality software
How to build quality software
 
Six Rules of Photography Composition
Six Rules of Photography CompositionSix Rules of Photography Composition
Six Rules of Photography Composition
 
ECAD MCAD Design Data Management with PTC Windchill and Cadence Allegro PCB
ECAD MCAD Design Data Management with PTC Windchill and Cadence Allegro PCBECAD MCAD Design Data Management with PTC Windchill and Cadence Allegro PCB
ECAD MCAD Design Data Management with PTC Windchill and Cadence Allegro PCB
 
Conferences i/o - Audience Engagement System
Conferences i/o - Audience Engagement SystemConferences i/o - Audience Engagement System
Conferences i/o - Audience Engagement System
 
U.S. Live Event Attendance Study
U.S. Live Event Attendance StudyU.S. Live Event Attendance Study
U.S. Live Event Attendance Study
 
Basics Of 3 Dimensional Design
Basics Of 3 Dimensional DesignBasics Of 3 Dimensional Design
Basics Of 3 Dimensional Design
 
Seat design
Seat designSeat design
Seat design
 
M2M, IoT, Device management: one protocol to rule them all? - EclipseCon 2014
M2M, IoT, Device management: one protocol to rule them all? - EclipseCon 2014M2M, IoT, Device management: one protocol to rule them all? - EclipseCon 2014
M2M, IoT, Device management: one protocol to rule them all? - EclipseCon 2014
 
Choosing the Right Trading Desk for Your Display Programmatic Buying
Choosing the Right Trading Desk for Your Display Programmatic BuyingChoosing the Right Trading Desk for Your Display Programmatic Buying
Choosing the Right Trading Desk for Your Display Programmatic Buying
 
Insufficienza valvolare aortica
Insufficienza valvolare aorticaInsufficienza valvolare aortica
Insufficienza valvolare aortica
 
Critical chain - Eliyahu goldratt
Critical chain - Eliyahu goldrattCritical chain - Eliyahu goldratt
Critical chain - Eliyahu goldratt
 
General 1 fixatives cytology
General  1 fixatives cytologyGeneral  1 fixatives cytology
General 1 fixatives cytology
 
4G Mobile Network & Applications
4G Mobile Network & Applications4G Mobile Network & Applications
4G Mobile Network & Applications
 
Intensive Reading: Methods and Strategies
Intensive Reading: Methods and StrategiesIntensive Reading: Methods and Strategies
Intensive Reading: Methods and Strategies
 
Macro etching
Macro etching Macro etching
Macro etching
 
Methods of Dewatering
Methods of DewateringMethods of Dewatering
Methods of Dewatering
 
What Is Digital Quality Management?
What Is Digital Quality Management?What Is Digital Quality Management?
What Is Digital Quality Management?
 
Five Generic Competitive Strategies
Five Generic Competitive StrategiesFive Generic Competitive Strategies
Five Generic Competitive Strategies
 
Interferometric modulator (imod)
Interferometric modulator (imod)Interferometric modulator (imod)
Interferometric modulator (imod)
 

Similar to Cyber Threat Management Services

Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective - David Peacock...
Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective -  David Peacock...Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective -  David Peacock...
Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective - David Peacock...Arrow ECS UK
 
Seizing the BYOD Opportunity
Seizing the BYOD OpportunitySeizing the BYOD Opportunity
Seizing the BYOD OpportunityJuniper Networks
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Chad Lawler
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...cVidya Networks
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity RoadmapRaleigh ISSA
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...Khazret Sapenov
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...Andris Soroka
 
Financial Analyst Day 2013
Financial Analyst Day 2013Financial Analyst Day 2013
Financial Analyst Day 2013avelinakauffman
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationIBM Danmark
 
Outlook emerging security_technology_trends
Outlook emerging security_technology_trendsOutlook emerging security_technology_trends
Outlook emerging security_technology_trendswardell henley
 
Cognitive security
Cognitive securityCognitive security
Cognitive securityIqra khalil
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategyJason Clark
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYODstefriche0199
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up EMC
 
Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility ManagementPlante & Moran
 

Similar to Cyber Threat Management Services (20)

Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective - David Peacock...
Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective -  David Peacock...Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective -  David Peacock...
Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective - David Peacock...
 
Seizing the BYOD Opportunity
Seizing the BYOD OpportunitySeizing the BYOD Opportunity
Seizing the BYOD Opportunity
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
 
Sw keynote
Sw keynoteSw keynote
Sw keynote
 
Fad final print
Fad final printFad final print
Fad final print
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
 
Financial Analyst Day 2013
Financial Analyst Day 2013Financial Analyst Day 2013
Financial Analyst Day 2013
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
Outlook emerging security_technology_trends
Outlook emerging security_technology_trendsOutlook emerging security_technology_trends
Outlook emerging security_technology_trends
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYOD
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up
 
Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility Management
 

More from Marlabs

Marlabs corporate deck july 2018
Marlabs corporate deck july 2018Marlabs corporate deck july 2018
Marlabs corporate deck july 2018Marlabs
 
Embracing Containers and Microservices for Future Proof Application Moderniza...
Embracing Containers and Microservices for Future Proof Application Moderniza...Embracing Containers and Microservices for Future Proof Application Moderniza...
Embracing Containers and Microservices for Future Proof Application Moderniza...Marlabs
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat IntelligenceMarlabs
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceMarlabs
 
Cognitive Computing - A Primer
Cognitive Computing - A PrimerCognitive Computing - A Primer
Cognitive Computing - A PrimerMarlabs
 
The Internet of Things : Developing a Vision
The Internet of Things : Developing a VisionThe Internet of Things : Developing a Vision
The Internet of Things : Developing a VisionMarlabs
 
Mahesh Eswar, Chief Revenue Officer at Marlabs, speaks at NJTC event, 'Breakf...
Mahesh Eswar, Chief Revenue Officer at Marlabs, speaks at NJTC event, 'Breakf...Mahesh Eswar, Chief Revenue Officer at Marlabs, speaks at NJTC event, 'Breakf...
Mahesh Eswar, Chief Revenue Officer at Marlabs, speaks at NJTC event, 'Breakf...Marlabs
 
Marlabs Capabilities Overview: Energy and Utilities
Marlabs Capabilities Overview: Energy and UtilitiesMarlabs Capabilities Overview: Energy and Utilities
Marlabs Capabilities Overview: Energy and UtilitiesMarlabs
 
Marlabs Capabilities Overview: Telecom
Marlabs Capabilities Overview: Telecom Marlabs Capabilities Overview: Telecom
Marlabs Capabilities Overview: Telecom Marlabs
 
Marlabs Capability Overview: Insurance
Marlabs Capability Overview: Insurance Marlabs Capability Overview: Insurance
Marlabs Capability Overview: Insurance Marlabs
 
Marlabs Capabilities Overview: Education and Media - Publishing
Marlabs Capabilities Overview: Education and Media - Publishing Marlabs Capabilities Overview: Education and Media - Publishing
Marlabs Capabilities Overview: Education and Media - Publishing Marlabs
 
Marlabs Capabilities Overview: Banking and Finance
Marlabs Capabilities Overview: Banking and Finance Marlabs Capabilities Overview: Banking and Finance
Marlabs Capabilities Overview: Banking and Finance Marlabs
 
Marlabs Capabilities Overview: Airlines
Marlabs Capabilities Overview: AirlinesMarlabs Capabilities Overview: Airlines
Marlabs Capabilities Overview: AirlinesMarlabs
 
Marlabs Capabilities: Healthcare and Life Sciences
Marlabs Capabilities: Healthcare and Life SciencesMarlabs Capabilities: Healthcare and Life Sciences
Marlabs Capabilities: Healthcare and Life SciencesMarlabs
 
Marlabs Capabilities: Retail
Marlabs Capabilities: Retail Marlabs Capabilities: Retail
Marlabs Capabilities: Retail Marlabs
 
Marlabs Services Capabilities Overview
Marlabs Services Capabilities OverviewMarlabs Services Capabilities Overview
Marlabs Services Capabilities OverviewMarlabs
 
Marlabs Capability Overview: Web Development, Usability Engineering Services
Marlabs Capability Overview: Web Development, Usability Engineering ServicesMarlabs Capability Overview: Web Development, Usability Engineering Services
Marlabs Capability Overview: Web Development, Usability Engineering ServicesMarlabs
 
Marlabs Capabilities Overview: QA Services
Marlabs Capabilities Overview: QA ServicesMarlabs Capabilities Overview: QA Services
Marlabs Capabilities Overview: QA ServicesMarlabs
 
Marlabs Capabilities Overview: India Professional Services
Marlabs Capabilities Overview: India Professional ServicesMarlabs Capabilities Overview: India Professional Services
Marlabs Capabilities Overview: India Professional ServicesMarlabs
 
Marlabs Capabilities Overview: Infrastructure Services
Marlabs Capabilities Overview: Infrastructure ServicesMarlabs Capabilities Overview: Infrastructure Services
Marlabs Capabilities Overview: Infrastructure ServicesMarlabs
 

More from Marlabs (20)

Marlabs corporate deck july 2018
Marlabs corporate deck july 2018Marlabs corporate deck july 2018
Marlabs corporate deck july 2018
 
Embracing Containers and Microservices for Future Proof Application Moderniza...
Embracing Containers and Microservices for Future Proof Application Moderniza...Embracing Containers and Microservices for Future Proof Application Moderniza...
Embracing Containers and Microservices for Future Proof Application Moderniza...
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat Intelligence
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cognitive Computing - A Primer
Cognitive Computing - A PrimerCognitive Computing - A Primer
Cognitive Computing - A Primer
 
The Internet of Things : Developing a Vision
The Internet of Things : Developing a VisionThe Internet of Things : Developing a Vision
The Internet of Things : Developing a Vision
 
Mahesh Eswar, Chief Revenue Officer at Marlabs, speaks at NJTC event, 'Breakf...
Mahesh Eswar, Chief Revenue Officer at Marlabs, speaks at NJTC event, 'Breakf...Mahesh Eswar, Chief Revenue Officer at Marlabs, speaks at NJTC event, 'Breakf...
Mahesh Eswar, Chief Revenue Officer at Marlabs, speaks at NJTC event, 'Breakf...
 
Marlabs Capabilities Overview: Energy and Utilities
Marlabs Capabilities Overview: Energy and UtilitiesMarlabs Capabilities Overview: Energy and Utilities
Marlabs Capabilities Overview: Energy and Utilities
 
Marlabs Capabilities Overview: Telecom
Marlabs Capabilities Overview: Telecom Marlabs Capabilities Overview: Telecom
Marlabs Capabilities Overview: Telecom
 
Marlabs Capability Overview: Insurance
Marlabs Capability Overview: Insurance Marlabs Capability Overview: Insurance
Marlabs Capability Overview: Insurance
 
Marlabs Capabilities Overview: Education and Media - Publishing
Marlabs Capabilities Overview: Education and Media - Publishing Marlabs Capabilities Overview: Education and Media - Publishing
Marlabs Capabilities Overview: Education and Media - Publishing
 
Marlabs Capabilities Overview: Banking and Finance
Marlabs Capabilities Overview: Banking and Finance Marlabs Capabilities Overview: Banking and Finance
Marlabs Capabilities Overview: Banking and Finance
 
Marlabs Capabilities Overview: Airlines
Marlabs Capabilities Overview: AirlinesMarlabs Capabilities Overview: Airlines
Marlabs Capabilities Overview: Airlines
 
Marlabs Capabilities: Healthcare and Life Sciences
Marlabs Capabilities: Healthcare and Life SciencesMarlabs Capabilities: Healthcare and Life Sciences
Marlabs Capabilities: Healthcare and Life Sciences
 
Marlabs Capabilities: Retail
Marlabs Capabilities: Retail Marlabs Capabilities: Retail
Marlabs Capabilities: Retail
 
Marlabs Services Capabilities Overview
Marlabs Services Capabilities OverviewMarlabs Services Capabilities Overview
Marlabs Services Capabilities Overview
 
Marlabs Capability Overview: Web Development, Usability Engineering Services
Marlabs Capability Overview: Web Development, Usability Engineering ServicesMarlabs Capability Overview: Web Development, Usability Engineering Services
Marlabs Capability Overview: Web Development, Usability Engineering Services
 
Marlabs Capabilities Overview: QA Services
Marlabs Capabilities Overview: QA ServicesMarlabs Capabilities Overview: QA Services
Marlabs Capabilities Overview: QA Services
 
Marlabs Capabilities Overview: India Professional Services
Marlabs Capabilities Overview: India Professional ServicesMarlabs Capabilities Overview: India Professional Services
Marlabs Capabilities Overview: India Professional Services
 
Marlabs Capabilities Overview: Infrastructure Services
Marlabs Capabilities Overview: Infrastructure ServicesMarlabs Capabilities Overview: Infrastructure Services
Marlabs Capabilities Overview: Infrastructure Services
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Cyber Threat Management Services

  • 1. Marlabs Cyber Threat Management Services © 2012 Marlabs Inc. Proprietary and Confidential
  • 2. About Marlabs Steady Growth Global Footprint • Founded in 1996 • US-centric operations with seamlessly integrated onsite and • 2,000+ employees offshore teams • Consistent year-on-year revenue growth • Headquarters in Piscataway , NJ - USA • 100+ prominent blue-chip clients across a • Global delivery headquarters in Bangalore, India wide variety of verticals including • Office Locations: USA - Piscataway (NJ), Bethlehem (PA); Citibank, Barclays, T-Mobile, Toshiba, India - Bangalore, Mysore, Pune, Cochin, and Trivandrum; Toys ''R'' Us, Reliant Energy, and the Mexico - Mexico City; Canada – Toronto; Malaysia - Kuala State of New Jersey. Lumpur; Latin America Vertical Expertise Technology Solutions • Airline • Energy and Utilities • Cloud Computing • Microsoft Services • Government • Mobility • Java • Healthcare • Education • BI-Analytics • Open Source • BFSI • Retail • ERP • Media © 2012 Marlabs Inc. Proprietary and Confidential 2
  • 3. Service Offerings Application Development and Maintenance| IT Infrastructure Services | Testing | Packaged SERVICES Implementation & Support | Product Engineering Energy Airline & Govt. BFSI Healthcare Media Education Retail Services Utilities VERTICALS TECHNOLOGY SOLUTIONS Information Security | Cloud | Mobility | BI-Analytics| Microsoft |Java | Open Source | ERP © 2012 Marlabs Inc. Proprietary and Confidential 3
  • 4. How to Secure a Network Purchase Good Firewalls, Install and Configure Install Intrusion Detection Systems in Network and Monitor Install Intrusion Prevention Systems Device to Protect against Threats Install Anti-Virus and Malware Prevention Software Install Authentication Server to Protect against Unauthorized Entry into Networks Install Encryption Process to Maintain Integrity & Confidentiality of Data © 2012 Marlabs Inc. Proprietary and Confidential 4
  • 5. Recent High-Profile Cyber Attacks Anonymous' Hackers Take Down Justice Department Site Over Megaupload Shutdown Romney Private email: Authorities How to Protect Yourself From Hacker Attacks Probe Possible Hacking Abroad Hackers Release Private FBI Call about Hackers Is the US already Engaged in a ‘Cyber War' © 2012 Marlabs Inc. Proprietary and Confidential 5
  • 6. Security Cost to Nation © 2012 Marlabs Inc. Proprietary and Confidential 6
  • 7. Who is Vulnerable? Banks and Internet Government Pharmaceutical Financial Service and Defense Companies Institutions Providers Agencies Contractors Every Man, to Multinational Woman & Government Corporations Child using Agencies the Internet © 2012 Marlabs Inc. Proprietary and Confidential 7
  • 8. Data Protection in the Cyber World – It’s about Managing Risk – No 100% Security Firewalls: Can be Bypassed Authentication: Can be Guessed or Attacked IDS Device: Lots of False Positives Anti-Virus: Only as Good as Last Signature Encryption: Cracked or Can Also Be Used By Attackers © 2012 Marlabs Inc. Proprietary and Confidential 8
  • 9. Marlabs Cyber Threat Management Service (CTMS) Methodology Experienced Leverage Holistic Security Cyber Intelligence Professionals Early Detection of Near-Real-Time Indicators and Analysis Warnings Forensically Sound Evidence © 2012 Marlabs Inc. Proprietary and Confidential 9
  • 10. Marlabs CTMS Approach Network Surveillance - NIKSUN Cyber Security Vulnerability Incident Assessment Management Cyber Security Operations Center Holistic Security Intelligence Log Collection Incident Plan Correlation Development and Analysis Security Device Management © 2012 Marlabs Inc. Proprietary and Confidential 10
  • 11. NIKSUN Network Surveillance Appliance – Provides Visibility Making the Unknown “Known” © 2012 Marlabs Inc. Proprietary and Confidential 11
  • 12. NIKSUN Network Surveillance Appliance 1. Everything must be recorded 2. Everything must be organized 3. Everything must be visible In real time for preemptive detection, operational analytics, forensic analysis – all in one device © 2012 Marlabs Inc. Proprietary and Confidential 12
  • 13. NIKSUN Network Surveillance Appliance All Incoming/Outgoing packets, flows, etc. are non- intrusively analyzed and optionally recorded -- at multi gigabit rates -- in real-time to generate pertinent metadata Enterprise-wide Metadata and analytics are immediately accessible for visibility, analysis, alarming and troubleshooting All raw packets and metadata are correlated, indexed and stored in NIKSUN’s built-in Knowledge Warehouse, creating a powerful and scalable real time source of network information The Industry’s Only Unified, Scalable and Cost-effective Holistic Security Monitoring Solution © 2012 Marlabs Inc. Proprietary and Confidential 13
  • 14. NIKSUN Network Surveillance Appliance Core Backbone Firewall Internal Network To Internet Router Internet Gigabit Ethernet Gigabit Ethernet Router Server End User Supply Location A Chain Router Intranet B2B / B2B2C Connecton Global Network F/W Router Correlation Location B Aggregation Management © 2012 Marlabs Inc. Proprietary and Confidential 14
  • 15. Thank You To learn more about how Marlabs can help you with your Cyber Security challenges, please call us at 732.694.1000 or write to us at sales@marlabs.com www.marlabs.com © 2012 Marlabs Inc. Proprietary and Confidential 15