Se ha denunciado esta presentación.
Se está descargando tu SlideShare. ×

NormShield Cyber Threat & Vulnerability Orchestration Overview

Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Cargando en…3
×

Eche un vistazo a continuación

1 de 19 Anuncio

NormShield Cyber Threat & Vulnerability Orchestration Overview

Descargar para leer sin conexión

NormShield is at the forefront of orchestrated cyber security operations and reporting, a transformative new category that Gartner calls SOAR. The NormShield cloud platform automates finding vulnerabilities, prioritizes them and provides actionable intelligence. A key differentiation is the company’s combination of advanced automation and human intelligence for reliability unparalleled in the industry. NormShield CISOs receive letter-grade risk scorecards. Their teams manage risk, not data. The results are measurable: informed decisions and swift action that reduces risk as never before possible and at an affordable price.

NormShield is at the forefront of orchestrated cyber security operations and reporting, a transformative new category that Gartner calls SOAR. The NormShield cloud platform automates finding vulnerabilities, prioritizes them and provides actionable intelligence. A key differentiation is the company’s combination of advanced automation and human intelligence for reliability unparalleled in the industry. NormShield CISOs receive letter-grade risk scorecards. Their teams manage risk, not data. The results are measurable: informed decisions and swift action that reduces risk as never before possible and at an affordable price.

Anuncio
Anuncio

Más Contenido Relacionado

Presentaciones para usted (20)

A los espectadores también les gustó (20)

Anuncio

Similares a NormShield Cyber Threat & Vulnerability Orchestration Overview (20)

Más reciente (20)

Anuncio

NormShield Cyber Threat & Vulnerability Orchestration Overview

  1. 1. ORCHESTRATED CYBER SECURITY OPERATIONS AND REPORTING Automatically see, prioritize and act on cyber threats
  2. 2. VULNERABILITIES ARE CONSTANT And give hackers months* to exploit *SOURCE: CISCO 2016 MIDYEAR CYBER SECURITY REPORT • Data leaks • Human Omissions • Lack of Vulnerability Management • Lack of Knowledge • Insider Threat • OPEN SOURCE INTELLIGENCE (OSINT) • HACKTIVIST FORUMS • SOCIAL MEDIA • BLOG AND USER GENERATED CONTENT • VULNERABILITY DATABASES • UNDERGROUND FORUMS BLACK MARKETS • Email/Password Harvesting • Mass/Spear Phishing • Malware Activities • IP Theft • Fraudulent domain
  3. 3. Vulnerabilities discovered MONTH FIVE Leaked passwords discovered MONTH FOUR Fraudulent domains discovered MONTH SIX Penetration testing begins MONTH ONE Penetration testing begins MONTH THREE Remediation finished MONTH TWO Remediation begins AVERAGE INDUSTRY RESPONSE TIME 100 to 200 days $15.4M Hacking attacks cost the average US firm annually
  4. 4. CISO • Risks not prioritized • Limited actionable intelligence SECURITY TEAM • Overwhelmed by data • ~40% false positives COMPLEX, INEFFICIENT AND EXPENSIVE Tools Required Today Vulnerability Management Cyber Threat Intelligence Continuous Perimeter Monitoring Passive Scanning full-time expert resources data data data data quarterly/monthly
  5. 5. • Unified vulnerability management • Cyber threat intelligence • Security Operations Center 360º • Executive risk scorecard MANAGE RISK, NOT SYSTEMS OR DATA The NormShield Cloud Platform Orchestrated cyber security operations reporting in one cloud platform
  6. 6. Validated by NormShield Engineers INFORMED DECISIONS, SWIFT ACTION The NormShield Cloud Platform Most Complete Risk Scoring Unified Vulnerability Management orchestrated and automated Cyber Threat Intelligence Security Operations 360o CISO: Informed decisions • Continuous visibility • Measurable performance SECURITY TEAM: Swift action • Prioritized tasks • Tickets auto-assigned real-time
  7. 7. • Automatic discovery of system changes and anomalies • Findings analyzed and prioritized • False positives eliminated • Root causes identified • Effectiveness of resolution measured UNIFIED VULNERABILITY MANAGEMENT NormShield UVM Best in class discovery
  8. 8. • Early warning before hackers exploit • Continuous and real-time monitoring • Monitors all sources, such as dark web, brand monitoring sites, social media and more • IP/domain reputation control • Fraudulent mobile app and domain tracking CYBER THREAT INTELLIGENCE NormShield CTI Hands-down most coverage
  9. 9. SECURITY OPERATIONS CENTER 360o NormShield SOC 360o • Automation + human intelligence • Automated SMTP and DNS health check • Domain and SSL monitoring • Uptime monitoring • Website and social media hijack detection Continuous perimeter monitoring Border Protection Asset Discovery 172.16.0.0 172.16.1.0 172.16.2.0 Defacement Alert IP/Domain Reputation BGP Hijack Phishing Alert Portmap SSL/Domain Control Malware Alert 24/7
  10. 10. • Understandable letter-grade format • Informed business decisions • Measurable performance • Early warning for high risk vulnerabilities EXECUTIVE RISK SCORECARD Measurement and Reporting Tool Included with the NormShield platform or through separate subscription Executive visibility
  11. 11. • Visibility to what hackers know about you • Validating and prioritizing risk • Reducing false positives • Certified Ethical Hackers using the same tools that hackers use NORMSHIELD Engineers Advanced automation + human intelligence
  12. 12. MONITORING - REST EASY DETEC T FIX VERIFY USE CASE New service detected! SCAN IF VULNERABLE TICKET • New cloud application • New server in DMZ • System configuration changes • Open firewall port
  13. 13. Security engineers with a major financial institution were not satisfied with managing too many systems generating too much data. NormShield significantly increased visibility to problems without overwhelming engineers with false positives. FINANCIAL
  14. 14. International retailer wanted more visibility to risks in their global footprint without being overwhelmed by data. NormShield gives them visibility and actionable intelligence. RETAIL 4,000 locations + online
  15. 15. NORMSHIELD CLOUD SUBSCRIPTION Executive Risk Scorecard included, or available as a separate subscription • Cloud-based solution • Annual subscription • Implementation, training, support, and maintenance included
  16. 16. NORMSHIELD CLOUD PLATFORM For the Enterprise Executive Risk ScorecardNormShield Cloud • Continuous risk level visibility for executives • Included with cloud subscription or available separately • Orchestrated security operations and reporting • Automatically see, prioritize and act on cyber threats
  17. 17. ADDITIONAL NORMSHIELD TOOLS • Easy-to-use tool for searching 5+ billion hacked data sets • Search for hacked credentials, hacked email credentials, fraudulent domains/apps, and reputation of IP addresses/domains 3rd Party Governance • Easy-to-use tool for analyzing cyber security risk levels of business partners without touching their systems • Utilizing the tools and techniques that hackers use Cyber Event Search Engine
  18. 18. • All developers are Certified Ethical Hackers • Frequent contributors to CVE (Common Vulnerability and Exposure) database • Creators of one of the largest databases of known vulnerabilities • Led by a former global CIO CYBER SECURITY IS OUR HEARTBEAT Team with deep expertise in security forensics
  19. 19. AUTOMATICALLY SEE, PRIORITIZE, ACT Request your free customized Risk Scorecard info@normshield.com +1 (571) 335-0222 www.normshield.com

×