egambit Your defensive cyber-weapon system. You have the players. We have the game. TEHTRIS

Similar documents
egambit Endpoint Security agent versus WannaCrypt Ransomware

Endpoint Security. How to improve the security of your endpoints thanks to the innovative egambit Endpoint Security agent

ANATOMY OF AN ATTACK!

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Unlocking the Power of the Cloud

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Hacker Academy UK. Black Suits, White Hats!

May the (IBM) X-Force Be With You

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Endpoint Protection : Last line of defense?

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

THE ACCENTURE CYBER DEFENSE SOLUTION

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

EMERGING THREATS & STRATEGIES FOR DEFENSE. Paul Fletcher Cyber Security

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Cyber Security Detection Technology for your Security Operations Centre. IT Security made in Europe

Certified Ethical Hacker (CEH)

Click to edit Master title style. DIY vs. Managed SIEM

Cyber Defense Operations Center

INFINIT Y TOTAL PROTECTION

Cisco Security. Advanced Malware Protection. Guillermo González Security Systems Engineer Octubre 2017

MEMORY AND BEHAVIORAL PROTECTION ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Ethical Hacking and Prevention

EC-Council C EH. Certified Ethical Hacker. Program Brochure

TRUE SECURITY-AS-A-SERVICE

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

IBM Security Network Protection Solutions

Security and Compliance Powered by the Cloud. Ben Friedman / Strategic Accounts Director /

Simplify Your Network Security with All-In-One Unified Threat Management

Cisco Advanced Malware Protection. May 2016

Getting over Ransomware - Plan your Strategy for more Advanced Threats

Synchronized Security

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

2. INTRUDER DETECTION SYSTEMS

Seqrite Endpoint Security

ENDPOINT SECURITY STORMSHIELD PROTECTION FOR WORKSTATIONS. Protection for workstations, servers, and terminal devices

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

Imperva Incapsula Website Security

IC32E - Pre-Instructional Survey

From Managed Security Services to the next evolution of CyberSoc Services

Symantec Ransomware Protection

Dynamic Datacenter Security Solidex, November 2009

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Trend Micro and IBM Security QRadar SIEM

Automated Response in Cyber Security SOC with Actionable Threat Intelligence

Cyber Security. Our part of the journey

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Cybersecurity Auditing in an Unsecure World

Building Resilience in a Digital Enterprise

BUILDING AND MAINTAINING SOC

Security Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management

Author: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0

SCALEFAST COMMERCE CLOUD INFRASTRUCTURE

Certified Cyber Security Specialist

T22 - Industrial Control System Security

AT&T Endpoint Security

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

deep (i) the most advanced solution for managed security services

Gladiator Incident Alert

Managed Endpoint Defense

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

Copyright 2011 Trend Micro Inc.

Emerging Threat Intelligence using IDS/IPS. Chris Arman Kiloyan

Securing the Modern Data Center with Trend Micro Deep Security

Qualys Cloud Platform

SentinelOne Technical Brief

CND Exam Blueprint v2.0

How We Delivered Compliance to a London-based Law Firm. A Network Security Project Case Study.

All-in one security for large and medium-sized businesses.

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

Detect Cyber Threats with Securonix Proxy Traffic Analyzer

Combating APTs with the Custom Defense Solution. Hans Liljedahl Peter Szendröi

Total Security Management PCI DSS Compliance Guide

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services

The Artificial Intelligence Revolution in Cybersecurity

Understanding Cisco Cybersecurity Fundamentals

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Look Who s Hiring! AWS Solution Architect AWS Cloud TAM

CASE STUDY: REGIONAL BANK

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Course 831 Certified Ethical Hacker v9

Industry 4.0 = Security 4.0?

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

CIS Controls Measures and Metrics for Version 7

The Next Generation Security Platform. Domenico Stranieri Pre- Sales Engineer Palo Alto Networks EMEA Italy

Transforming Security from Defense in Depth to Comprehensive Security Assurance

An Aflac Case Study: Moving a Security Program from Defense to Offense

Best Practices in Healthcare Risk Management. Balancing Frameworks/Compliance and Practical Security

CompTIA CAS-002. CompTIA Advanced Security Practitioner (CASP) Download Full Version :

Deep instinct For MSSPs

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

CloudSOC and Security.cloud for Microsoft Office 365

Security Information & Event Management (SIEM)

Human factor in CyberSecurity

CIS Controls Measures and Metrics for Version 7

Reduce Your Network's Attack Surface

Transcription:

egambit Your defensive cyber-weapon system. You have the players. We have the game. 2010-2017 1

NIDS egambit is the awarded product that can monitor and improve your IT Security against complex threats like cyber-spy or cyber-sabotage activities. This solution is realized by TEHTRIS company in FRANCE. It is fully designed and developed near Bordeaux, and Paris as well. Created in 2012, the egambit product has already helped companies in China, Brazil, Middle-East, USA and Europe against internal and external cyber threats. In 3 years egambit has already caught billions of events related to security issues worldwide, thanks to the tremendous skills and motivation of expert Consultants working on the project with a real Ethical Hacking spirit. 100% of the source code is within TEHTRIS hands, and it was designed with extended security features. egambit is your defensive cyber-weapon system. 2

Quick overview of egambit s features Let s have a global overview about this defensive cyberweapon system. If you need more information, please check other detailed documents. 3

Global Architecture oeasy to deploy Simply add one or more egambit appliances on each area you need to protect Cloud, Datacenter, Plant/Mill, Office network, etc. Then egambit will monitor and protect these infrastructures against cyber threats oeasy to use All your egambit appliances will be linked through a secure infrastructure allowing remote and local analysis of the security issues Follow bounces of intruders, detect cyber-spy operations, reject offensive insiders... egambit Site [N] of Customer [X] egambit Site [N+1] of Customer [X] Dedicated infrastructure for Customer [X] Internet TEHTRIS Cloud egambit Cloud with certified hosting - PCI-DSS Level 1 - ISO27001:2005 - SOC1 Type II / SSAR16 ISAE3402 - SOC2 Type II Site [ ] of Customer [X] 4

Powerful Appliances oready to serve oready to fight egambit appliances can fully protect your infrastructure thanks to unlimited signatures, unlimited correlations, unlimited quotas of events, and complete security features egambit appliances are built with the best security methods and technologies with custom kernels and specific security features 5

Know your Assets owhat is deployed? Where is it connected? è Inventory owhat is installed and where? egambit will do passive and active detection of your assets by listening to flows, and by doing requests to specific devices like switches oinventory and Security? Find and follow weird or rogue devices joining your environment: illegal plug of external devices, unwanted walks inside your networks 6

Know your Vulnerabilities ohow secure is your infrastructure? è Audits opassive audit Continuous and safe vulnerability audits by listening to your assets This will detect security issues without launching dialogs or scans against your assets (respectful audits) oactive audit Direct security scans can be used to evaluate the security of your assets Link egambit to an external security assessment product 7

SIEM oegambit proposes a full SIEM Security Information and Event Management ocollect and manage your logs Centralize your logs from any of your sources thanks to agent or agent-less technologies Long-term storage will help Further analysis Log crunching sessions Forensic activities osecurity alerts generated by the egambit correlation engine Unlimited and updated correlation rules will generate security alerts when needed 8

NIDS oegambit proposes a full NIDS Network Intrusion Detection System odetect intrusion attempts / abnormal behaviors Placed at strategic points like infrastructure links, egambit can monitor interesting traffic to and from your devices osignatures Thousands of signatures with daily updates can handle multiple families of threats, like Malwares, Trojans, Exploits, Web attacks 9

Honeypots oegambit proposes a Honeypots features odefeat fingerprinting and offensive tools Create fake assets to detect attackers and low signals linked to security issues owhy egambit? During the beginning of a Chess game, a gambit is a voluntary sacrifice of a pawn, in order to get a strategic advantage With egambit, it s like adding sharp pawns in your IT infrastructure to detect the presence of unwanted activities by deluding attackers and cyber-weapons 10

Endpoint Security oegambit proposes an advanced Endpoint Security agent Enhanced HIPS-like agent [Host-based Intrusion Prevention System] Retaliation and interaction against threats Handle attackers and malwares even when your barriers were defeated odeployed on your operating systems, the agents will monitor system activity to detect and prevent intrusion attempts or abnormal behaviors othis can handle multiple families of threats Malwares, Advanced Persistent Threats, Trojans 11

Forensics ohow to handle security incidents and follow the real threats worldwide? othanks to public and private services, egambit Forensics features will help at analyzing advanced threats targeting your environment odepending on the threats, you have many layers of actions Advanced logs analysis Network and system forensics Specific sandboxing activities Reverse engineering Remote offline forensics analysis 12

Threat Intelligence othreat Intelligence Database Centralization of millions of threats shared through egambit engines oour consultants continuously follow real security threats and deliver regular updates that are linked to offensive threats Advanced Persistent Threats (APT), Botnets Compromised boxes Links to infected sites 13

Artificial Intelligence owhen signatures technologies are unable to recognize unknown patterns and hebaviors, you definitely need new technologies oegambit includes Artificial Intelligence engine based on deep learning in order to detect unknown attacks Unknown backdoors Unknown malwares 14

TEHTRIX otehtrix is the internal Linux distribution used to host egambit services Ensures a high security level Hardened Kernel Customized kernel with improved security parameters and features at the lowest level Full Security 100% network flows ciphered 100% files and data ciphered 100% permissions audited RBAC Security policies with local hardening and privileges separation FDE Hardened Full Disk Encryption with specific features e.g. All your logs / alerts are ciphered Network Security VPN: Global external infrastructure of management Firewalls: Home-based Anti-DDOS technologies 15

Let s adopt egambit 16