NormShield is at the forefront of orchestrated cyber security operations and reporting, a transformative new category that Gartner calls SOAR. The NormShield cloud platform automates finding vulnerabilities, prioritizes them and provides actionable intelligence. A key differentiation is the company’s combination of advanced automation and human intelligence for reliability unparalleled in the industry. NormShield CISOs receive letter-grade risk scorecards. Their teams manage risk, not data. The results are measurable: informed decisions and swift action that reduces risk as never before possible and at an affordable price.
NormShield is at the forefront of orchestrated cyber security operations and reporting, a transformative new category that Gartner calls SOAR. The NormShield cloud platform automates finding vulnerabilities, prioritizes them and provides actionable intelligence. A key differentiation is the company’s combination of advanced automation and human intelligence for reliability unparalleled in the industry. NormShield CISOs receive letter-grade risk scorecards. Their teams manage risk, not data. The results are measurable: informed decisions and swift action that reduces risk as never before possible and at an affordable price.
1.
ORCHESTRATED
CYBER
SECURITY
OPERATIONS
AND REPORTING
Automatically see,
prioritize and act on cyber
threats
2.
VULNERABILITIES ARE CONSTANT
And give hackers months* to exploit *SOURCE: CISCO 2016 MIDYEAR CYBER SECURITY REPORT
• Data leaks
• Human Omissions
• Lack of
Vulnerability
Management
• Lack of Knowledge
• Insider Threat
• OPEN SOURCE
INTELLIGENCE (OSINT)
• HACKTIVIST FORUMS
• SOCIAL MEDIA
• BLOG AND USER
GENERATED CONTENT
• VULNERABILITY
DATABASES
• UNDERGROUND
FORUMS
BLACK MARKETS
• Email/Password
Harvesting
• Mass/Spear
Phishing
• Malware Activities
• IP Theft
• Fraudulent domain
3.
Vulnerabilities discovered
MONTH FIVE
Leaked passwords
discovered
MONTH FOUR
Fraudulent domains
discovered
MONTH SIX
Penetration testing begins
MONTH ONE
Penetration testing begins
MONTH THREE
Remediation finished
MONTH TWO
Remediation begins
AVERAGE INDUSTRY RESPONSE TIME
100 to 200 days
$15.4M
Hacking attacks
cost the average
US firm annually
4.
CISO
• Risks not prioritized
• Limited actionable intelligence
SECURITY TEAM
• Overwhelmed by data
• ~40% false positives
COMPLEX, INEFFICIENT AND EXPENSIVE
Tools Required Today
Vulnerability
Management
Cyber Threat
Intelligence
Continuous
Perimeter
Monitoring
Passive
Scanning
full-time expert resources
data data data data
quarterly/monthly
5.
• Unified vulnerability management
• Cyber threat intelligence
• Security Operations Center 360º
• Executive risk scorecard
MANAGE RISK, NOT SYSTEMS OR DATA
The NormShield Cloud Platform
Orchestrated cyber security
operations reporting in one
cloud platform
6.
Validated by
NormShield Engineers
INFORMED DECISIONS, SWIFT ACTION
The NormShield Cloud Platform
Most
Complete
Risk Scoring
Unified
Vulnerability
Management
orchestrated and automated
Cyber Threat
Intelligence
Security
Operations
360o
CISO: Informed decisions
• Continuous visibility
• Measurable performance
SECURITY TEAM: Swift
action
• Prioritized tasks
• Tickets auto-assigned
real-time
7.
• Automatic discovery of system
changes and anomalies
• Findings analyzed and prioritized
• False positives eliminated
• Root causes identified
• Effectiveness of resolution
measured
UNIFIED VULNERABILITY MANAGEMENT
NormShield UVM
Best in class discovery
8.
• Early warning before hackers exploit
• Continuous and real-time monitoring
• Monitors all sources, such as dark
web, brand monitoring sites, social
media and more
• IP/domain reputation control
• Fraudulent mobile app and domain
tracking
CYBER THREAT INTELLIGENCE
NormShield CTI
Hands-down most coverage
9.
SECURITY OPERATIONS CENTER 360o
NormShield SOC 360o
• Automation + human intelligence
• Automated SMTP and DNS
health check
• Domain and SSL monitoring
• Uptime monitoring
• Website and social media hijack
detection
Continuous perimeter
monitoring
Border Protection
Asset Discovery
172.16.0.0
172.16.1.0
172.16.2.0
Defacement Alert
IP/Domain Reputation
BGP Hijack
Phishing Alert
Portmap
SSL/Domain Control
Malware Alert
24/7
10.
• Understandable letter-grade format
• Informed business decisions
• Measurable performance
• Early warning for high risk vulnerabilities
EXECUTIVE RISK SCORECARD
Measurement and Reporting Tool
Included with the NormShield platform or
through separate subscription
Executive visibility
11.
• Visibility to what hackers know
about you
• Validating and prioritizing risk
• Reducing false positives
• Certified Ethical Hackers
using the same tools that
hackers use
NORMSHIELD
Engineers
Advanced automation
+ human intelligence
12.
MONITORING
- REST EASY
DETEC
T
FIX
VERIFY
USE CASE
New service detected!
SCAN
IF VULNERABLE
TICKET
• New cloud application
• New server in DMZ
• System configuration
changes
• Open firewall port
13.
Security engineers with a
major financial institution were
not satisfied with managing
too many systems generating
too much data.
NormShield significantly
increased visibility to problems
without overwhelming
engineers with false positives.
FINANCIAL
14.
International retailer wanted
more visibility to risks in their
global footprint without being
overwhelmed by data.
NormShield gives them
visibility and actionable
intelligence.
RETAIL
4,000 locations + online
15.
NORMSHIELD CLOUD SUBSCRIPTION
Executive Risk Scorecard included, or
available as a separate subscription
• Cloud-based solution
• Annual subscription
• Implementation, training, support,
and maintenance included
16.
NORMSHIELD CLOUD PLATFORM
For the Enterprise
Executive Risk ScorecardNormShield Cloud
• Continuous risk level visibility for executives
• Included with cloud subscription or available
separately
• Orchestrated security operations and
reporting
• Automatically see, prioritize and act on cyber
threats
17.
ADDITIONAL NORMSHIELD TOOLS
• Easy-to-use tool for searching 5+ billion hacked
data sets
• Search for hacked credentials, hacked email
credentials, fraudulent domains/apps, and
reputation of IP addresses/domains
3rd Party Governance
• Easy-to-use tool for analyzing cyber security
risk levels of business partners without
touching their systems
• Utilizing the tools and techniques that
hackers use
Cyber Event Search Engine
18.
• All developers are Certified Ethical
Hackers
• Frequent contributors to CVE
(Common Vulnerability and Exposure)
database
• Creators of one of the largest
databases of known vulnerabilities
• Led by a former global CIO
CYBER SECURITY IS OUR HEARTBEAT
Team with deep expertise in
security forensics
19.
AUTOMATICALLY SEE, PRIORITIZE, ACT
Request your free customized
Risk Scorecard
info@normshield.com
+1 (571) 335-0222
www.normshield.com
Los recortes son una forma práctica de recopilar diapositivas importantes para volver a ellas más tarde. Ahora puedes personalizar el nombre de un tablero de recortes para guardar tus recortes.
Crear un tablero de recortes
Compartir esta SlideShare
¿Odia los anuncios?
Consiga SlideShare sin anuncios
Acceda a millones de presentaciones, documentos, libros electrónicos, audiolibros, revistas y mucho más. Todos ellos sin anuncios.
Oferta especial para lectores de SlideShare
Solo para ti: Prueba exclusiva de 60 días con acceso a la mayor biblioteca digital del mundo.
La familia SlideShare crece. Disfruta de acceso a millones de libros electrónicos, audiolibros, revistas y mucho más de Scribd.
Parece que tiene un bloqueador de anuncios ejecutándose. Poniendo SlideShare en la lista blanca de su bloqueador de anuncios, está apoyando a nuestra comunidad de creadores de contenidos.
¿Odia los anuncios?
Hemos actualizado nuestra política de privacidad.
Hemos actualizado su política de privacidad para cumplir con las cambiantes normativas de privacidad internacionales y para ofrecerle información sobre las limitadas formas en las que utilizamos sus datos.
Puede leer los detalles a continuación. Al aceptar, usted acepta la política de privacidad actualizada.