SECURITY INTELLIGENCE CONTINOUS IT SITUATION AND INTELLIGENT DETECTION SELF-LEARNING INTUITIVE EASY INTEGRATION
THREAT LANDSCAPE IT SECURITY ARE YOU PREPARED FOR PRESENT AND FUTURE THREATS? INSUFFICIENT RESISTANCE OF YOUR NETWORK INCREASED NUMBER OF INTELLIGENT ATTACKS: APTs INCREASED INTERCONNEC- TIONS: INDUSTRIE 4.0 Vulnerabilities in networks are not detected adequately and continuously. Furthermore networks are not assessed as a whole. Missed or postponed updates as well as outdated systems offer targets for successful attacks. Targeted, advanced and continuous threats are challanges, that have to be met by companies and their existing security systems. The detection and protection of such scenarios require much more than classic protection functions are capable of. Industrie 4.0 means the global connection of machines and production. Important success factors are failure-free and efficiently operating IT infrastructures. At the same time threats get more professional and diverse. Successful attacks reduce the productivity, disclose company secrets and jeopardize the organization. SECURITY INTELLIGENCE WITH SPOTUATION spotuation keeps the whole network in sight. Thanks to continuous situation mapping anomalies will be recognized at an early stage and weak points will be identified immediate. The system is not static. It learns the behavior of your network (Machine Learning). This abilty allows the development of an reliable early warning system. Your networks resistance will be strengthened efficiently, measurable and promt. spotuation is able to detect new types of attacks based on their communicational behavior. The system is based on an innovative attacking and anomaly detection system. To uncover infection attempts in time, covered channels and manipulated connections are detected by spotuation. The use of the spotuation Security Intelligence within an Security Operating Center (SOC) allows you to detect unanticipated attack patterns. In combination with real time monitoring you can achieve an exceptional high level of detection. This allows you to react as fast as possible on cyberattacks (early warning system). Corporate Network spotuation Security Intelligence Web based Threats Classical protection Systems Inbound traffic spotuation Sensor * Malware Trojaner Intrusion Prevention next Generation FW Outbound traffic C & C Server Botnets Continous situation mapping Detection of vulnerabilities (incresing resistance) Continous monitoring Anomalie detection (Machine Learning) Continous Threat Detection (Early Warning System) * The sensor serves the passive analysis of the networks communication. For this purpose it is usually set up at the internet connection points. Sensors are linked either to spotuation as a service or spotuation on premises.
SPOTUATION INCLUDES THE FOLLOWING FUNCTIONS IN DEPTH ANALYSIS Forensics on operational or security incidents REPORTING: COMPREHENSIVE COMMUNICATION SITUATION Status of network resistance Automated uncovering of vulnerabilities in systems Automated uncovering of vulnerabilities in traffic spotuation Netzwerk Network Intelligence Intelligenz COMPLIANCE VERIFICATION Intelligent alerts Notifications for detected hidden communication channels Notifications for policy violations REALTIME- MONITORING Machine learning of network behavior Automated uncovering of traffic anomalies (Behaviour Analysis) ADVANCED THREAT DETECTION Automated uncovering of Advanced Persistent Threats (APTs) Botnet detection and uncovering of command and control traffic Detection of infection attempts via manipulation of connections SPOTUATION OFFERS ADDITIONAL FEATURES REFERENCE SYSTEM Get the chance to compare several locations of your company based on the communication parameters Benchmarking of your own company with the particular business sector Early identification of possible threats when other companies get attacked REPUTATION SYSTEM Valuation of several communication parameters regarding safety and strength White- or blacklist the protocols you want Custumer specefic solutions for your needs THREAT INTELLIGENCE All the information about attacks, control channels and patterns are collected in a central database. This database is available for all users. YOUR BENEFITS Complete transparency of the networks communication Protection against advanced forms of attacks Automated alerts for immediate response Recommendations for proactive protection Intuitive mapping of the state of communication security Enhanced network robustness Detection of behavioral problems (Signature Detection)
PICTURE OF YOUR NETWORK SECURITY Continous Data Collection (Sensor) ROTECTIO N -P TA N D I O DA UTZNSCH DATE FORM N O K T AT A- P R O T E C Intelligent Intuitive Data Evaluation Visualization (Core-System) spotuation removes personal data right before further processing. This data can be use only in suspicious cases. (Web-Portal) E IN AD M Y MAN GER MA DE IN spotuation was developed in Germany and matches the required security standarts. With that we want to ensure the trustworthiness. THE RIGHT PACKAGE FOR YOUR NEEDS SPOTUATION AS A SERVICE SPOTUATION ON PREMISES Simple integration Data control and data security Scalable No extern connection Cloud-connection CONSULTATION AND TRAINING ADDITIONAL SERVICES All spotuation topics Managed Security Services, 24x7 Monitoring In-depth analysis Security strategies Response ( Next Business Day ) On-Site support INTEGRATION ORGANIZATIONAL TECHNOLOGICAL Information Security Management System (ISMS) Security Information and Event Management (SIEM) Security Operation Center (SOC) Industrie 4.0 Solutions Computer Emergency Response Team (CERT) Weitere IoT Applications
TECHNICAL DATA Sensor Small Medium Large Throughput 200 Mbit/s 2 Gbit/s 10 Gbit/s Interfaces 10/100/1000 Mbit/ s 2 2 Interfaces 10 Gbit/s - 2 PC- / Rack- possibility (Modul Size) Yes / Yes (1) Yes / Yes (1) / Yes (1) Core-System saas sop Small sop Medium sop Large Number of Sensors (max.) Unlimited 5 20 50 Rack-Size - 1 2 4 Full control of your own Data - Yes Yes Yes Function selection Modular All All All THE RESULT OF INTENSIVE RESEARCH spotuation arised from a contract research. The system was developed as a network situation mapping technology, which was originally used for the protection of a public authority s network infrastructure. Since then the technology is pushed forward in many innovative ways. Today the system is used in many companies with lasting and measurable success.
SEE MORE THAN ATTACKERS EXPECT! FINALLY SAFE IS A GERMAN TECHNOLOGY STARTUP AND DEVELOPER OF SPOTUATION NETWORK INTELLIGENCE. OUR AIM IS TO MAKE THE COMMUNICATION WITHIN YOUR NETWORK VISIBLE. THIS GIVES CUSTOMERS THE CHANCE TO ACHIEVE A HIGHER NETWORK RESISTANCE AND TO DETECT ADVANCED FORMS OF ATTACKS MORE RAPID. CONTACT WE LOOK FORWARD TO HEARING FROM YOU! finally safe GmbH Kurfürstenstr. 58 D-45138 Essen +49 201 5454 1060 info@finally-safe.com www.finally-safe.com