HOLISTIC COMMUNICATIONS SECURITY

Similar documents
Express Monitoring 2019

Gujarat Forensic Sciences University

Achieving End-to-End Security in the Internet of Things (IoT)

Complying with RBI Guidelines for Wi-Fi Vulnerabilities

Positive Technologies Telecom Attack Discovery DATA SHEET

WHITE PAPER 2019 AUTHENTICATOR WHITE PAPER

Personal Cybersecurity

On the Radar: Positive Technologies protects against SS7 network vulnerabilities

Real-time Communications Security and SDN

QuickBooks Online Security White Paper July 2017

Keys to a more secure data environment

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Cyber Attacks & Breaches It s not if, it s When

Comprehensive Database Security

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

Private cloud for business

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

716 West Ave Austin, TX USA

deep (i) the most advanced solution for managed security services

WHITE PAPER- Managed Services Security Practices

Hassle-free banking in the DIGITAL AGE through NEXT-GEN. Technologies W H I T E PA P E R

Advanced Diploma on Information Security

Certified Cyber Security Specialist

Executive Summary. (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation

Cybersecurity and the Board of Directors

Cyber Security Technologies

Security

to Enhance Your Cyber Security Needs

Security Specification

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Vulnerabilities in online banking applications

MEETING ISO STANDARDS

Retail Security in a World of Digital Touchpoint Complexity

European Union Agency for Network and Information Security

ABOUT COMODO. Year Established: 1998 Ownership: Private Employees: over 700

Orange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

Kaspersky Enterprise Cybersecurity. Kaspersky Security Assessment Services. #truecybersecurity

Safeguarding company from cyber-crimes and other technology scams ASSOCHAM

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

E-guide Getting your CISSP Certification

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

Enterprise Mobility Management

Run the business. Not the risks.

Cybersecurity, safety and resilience - Airline perspective

locuz.com SOC Services

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Twilio cloud communications SECURITY

The Common Controls Framework BY ADOBE

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

Secure Product Design Lifecycle for Connected Vehicles

Mavenir Keynote. Think Smarter Secure communication Innovate Services. By Mohamed Issa Regional Head of Africa Sales

The WiMAX Technology

Ingram Micro Cyber Security Portfolio

LinQ2FA. Helping You. Network. Direct Communication. Stay Fraud Free!

Meeting FFIEC Meeting Regulations for Online and Mobile Banking

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT

CCISO Blueprint v1. EC-Council

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Checklist: Credit Union Information Security and Privacy Policies

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust

InterCall Virtual Environments and Webcasting

Emerging Technologies The risks they pose to your organisations

Wireless e-business Security. Lothar Vigelandzoon

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

How Secure is Blockchain? June 6 th, 2017

Package of initiatives on Cybersecurity

WHITE PAPER. Session Border Controllers: Helping keep enterprise networks safe TABLE OF CONTENTS. Starting Points

ISC2. Exam Questions CISSP. Certified Information Systems Security Professional (CISSP) Version:Demo

Cloud Security Myths Paul Mazzucco, Chief Security Officer

ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry

Achilles System Certification (ASC) from GE Digital

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

We Make IT Simple. IT Support and Security Specialists.

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Teradata and Protegrity High-Value Protection for High-Value Data

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Penetration testing.

Presented by: Njei Check Head, Audit Security Division, ANTIC

PROACTIVE APPROACH. INTELLIGENT CYBERSECURITY. ptsecurity.com

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Sneak Peak at CIS Critical Security Controls V 7 Release Date: March Presented by Kelli Tarala Principal Consultant Enclave Security

WORKSHARE SECURITY OVERVIEW

To: All Deposit Money Banks, Switches, Mobile Money Operators, Payment Solution Service Providers, Micro Finance Banks & Others

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

The Case for Secure Communications

Accelerate GDPR compliance with the Microsoft Cloud Agustín Corredera

Google Cloud Platform: Customer Responsibility Matrix. December 2018

Oracle Data Cloud ( ODC ) Inbound Security Policies

THALES DATA THREAT REPORT

NEXT GENERATION SECURITY OPERATIONS CENTER

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Building a Resilient Security Posture for Effective Breach Prevention

Six steps to control the uncontrollable

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Transcription:

HOLISTIC COMMUNICATIONS SECURITY BLACK TIGER COUNTERING CYBER TERRORISM

HOLISTIC COMMUNICATIONS SOLUTION LACSMI is leading vendor in telecommunications since 1992 promoting set of security solutions worldwide under the BLACK TIGER brand. Many years of experience of the international team of experts in the area allows us develop not only a set of solutions but solutions integrated into one holistic approach. Telecommunication companies are facing numerous IT threats and a variety of compliance requirements. In engaging with millions of customers subscribing to services ranging from cable, the Internet, home and mobile phone service and even data centers, the telecom industry is working in an environment that requires proven cyber security and information assurance. Communications became essential now not only for passing information but as they became part of Internet of Things. So protection of communication lines is now essential part of modern security. Trusted solutions of the LACSMI are ready to become a reliable support and guarantee of protection of your production. Our specialists will be happy to assist and conduct necessary audit and develop holistic protection

1 HOLISTIC APPROACH TO COMMUNICATIONS SECURITY Telecom security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a communication networks and networkaccessible resources. Modern telecommunication networks include number of different tools starting from GSM technologies and up to IP messengers. Number of attacks through telecom networks hit mobile phones of VIPs all over the world, became most common hacker step towards targeted attack on banks or industrial enterprises. Securing all types of telecom infrastructure became essential for government and organizations and requires holistic approach. BlackTiger has developed such holistic approach that protects whole infrastructure of your possible telecom networks and introduced first in the world unique solutions and services. 1 2 3 4 5 TRAINING Specialists training is the first and fundamental step towards ensuring cybersecurity. BlackTiger provides training for IT-officers, CTO's, telecom teams, government cybersecurity bodies. АUDIT AND CYBER SURVEILLANCE AUDIT AND CYBER SURVEILLANCE BlackTiger provides complex telecom operators SS7 infrastructure audit, buildings and offices GSM-bugs audit and networks security audit. Audit results with detailed infrastructure flaws report and security system design. SECURE LOCAL CELLULAR OPERATOR Local cellular telecom operator is innovative telecom security approach that works only inside a designated buildings. All calls are carried out without the external cellular operator. That is very important when one takes into account that cellular providers have many security flaws. SECURE AND PRIVATE MESSAGING Messages sent via our software are end-to-end encrypted and are unavailable for man-in-the-middle attack TELECOM SECURITY OPERATION CENTER Security Operations Center for telecom operators, governments or organizations allows to control all communication channels and have holistic understanding of security state.

TRAINING TELECOM SECURITY SPECIALISTS TRAINING NON TELECOM SECURITY SPECIALISTS TRAINING During training sessions telecom security specialists will get practical knowledge how to detect and protect telecom infrastructure from SS7 attacks. Non telecom security specialists will get skills on detection of an unauthorized modems that are sending information from organizations infrastructure. MOST COMMON INSIDE/OUTSIDE ATTACKS: PENETRATION TESTS TRAINING Discovering a subscriber s location Voice call redirection and interception Disrupting a subscriber s service Recording a conversation SMS interception Disrupting the availability of a mobile switch Unstructured Supplementary Service Data (USSD) forgery requests (and transfer of funds as a result of this attack) 2 Specialists skills after training will involve understanding of common vulnerabilities, detection of vulnerabilities, understanding evolving telecom hackers targeted attacks. During training sessions telecom security specialists will get practical knowledge how to detect and protect telecom infrastructure from SS7 attacks.

АUDIT AND CYBER SURVEILLANCE Audit for telecom involves complex audit of telecom infrastructure Audit of IT infrastructure for Mobile operator Recommendations to secure found vulnerabilities Penetration test SECURITY-LEVEL MANAGEMENT SYSTEM 1 Performs constant monitoring for vulnerabilities in primary and secondary software/hardware components of the system 2 Identifies the level of threat and the possibility to use it 3 Recommends protective measures 4 Performs trending of threats for personal to make preventive actions BENEFITS FOR COMPANY: Increases the cybersecurity protection of network Simplifies the work for security officers and communication with IT department Reduces a number of cybersecurity violation incidents Makes a clear scaled protection picture for particular divisions and the whole company AUDIT FOR ORGANIZATIONS AND COMPANIES 3 SECURITY AUDIT OF CELLULAR NETWORK Security analysis of radio interface Security analysis of cellular infrastructure Security analysis of network core Security analysis of data storages and payment systems SECURITY ANALYSIS OF RADIOCHANNELS AND CELLULAR DEVICES Detection of an unauthorized modems which are sending information about the target object Protocols recovery Cellular assets phase-testing

SECURE LOCAL CELLULAR OPERATOR We have developed a special range of devices to ensure the security of wireless communications. Our solution is based on limitation of access rights to various communication channels, independence from cellular operators and the smooth cancellation of prohibited radio signals. The wireless communications security system consists of three devices: BASE STATION SELECTIVE BLOCKING OF INDIVIDUAL ROOMS AND SUBSCRIBERS Using our devices allows us to develop and implement a wireless access rights policy by creating black and white lists. Lists contain access permissions of individual rooms and subscribers. All information about compliance or violation of the security policy rules is aggregated in the situation center, ensuring instant response to incidents. allows you to provide an independent cellular connection in the selected location. CELLULAR BLOCKER allows you to limit the use of cellular communication in the selected location. INTELLECTUAL WIRELESS NETWORKS SUPPRESSOR allows you to selectively limit the use of wireless radio links: Wi-Fi, ZigBee, Bluetooth and other. On black list: complete communication block 4

5 PERIMETER PROTECTION SYSTEMS The use of our devices will help create a perimeter security system that works on the principle of determining the unique characteristics of cellular devices and comparing them with the policy of black and white lists. CONNECTION OF TERRITORIALLY DISTRIBUTED OBJECTS Secure communication channel Protection of telecommunications allows you to scan the phones of all persons entering the protected perimeter. In combination with video surveillance systems, this makes perimeter protection more efficient Base station subscriber 1 Base station subscriber 2 Security Officer сan see all IMSI / IMEI phone codes passing through security checkpoints The advantages of using our base station are not limited to the location in which it is installed. You can contact via secure channel with users of our base stations located at significant distances (in another city, another country or even on another continent). Our base station creates its own network, independent from external operators. The rules for using the internal network can be flexibly configured to meet all customer requirements. In particular, it may be possible to connect subscribers of the internal network to subscribers of cellular networks of other operators.

SECURE AND PRIVATE MESSAGING We have developed a set of solutions for messaging that is both secure and private. The difference is simple and obvious - the first generation of messaging services (like SMS) was both not secure (it could be easily intercepted) and not private (when message is intercepted, it s easy to understand, who s the sender and who s the receiver). The second generation is secure (messages can t be decrypted in reasonable amount of time), but not private. Black Tiger provides new generation of messaging solutions - both secure and private. It has been achieved by both unique network protocols and careful server infrastructure design. We ve re-invented messaging privacy, implementing: direct connections (peer-to-peer) for texting and calls, which not only provide a direct channel for session, but also able to adapt these channels according to network conditions. Thanks to TrickleICE, we have industry-leading connection establishment time blockhain-based protocol for texting - Black Tiger team has created the first mobile-friendly pseudorandom routing protocol based on blockchain traditional client-server protocol with end-to-end encryption and anonymous server chats (no personal information, suitable for identification, is stored on server) Meeting the demands of tomorrow, we also created a unique server infrastructure: High-load server, developed on C++ Infrastructure is ready for horizontal scaling Infrastructure is ready to be geographically spread thanks to unique 100G encryption module that can provide datacenter synchronization 6

7 ADDITIONAL SECURITY FEATURES Encryption during data storage Forget about Dropbox & Google Drive, we took care about documents - they are sent as securely, as messages, and they are saved with strong encryption on the device! Messenger is not tied to mobile number We know, that users can stay invisible only when they doesn t need to share any personal information at all. Unlike most of messengers, messenger user doesn t bind his account to a phone number. It protects our users from SIM clonning attack via SS7 - when another device claims to have the same number as yours and can pass phone number authentication. Secured contacts exchange We belive, that both your message and contacts list are significant to your confidentiality, so we store your contacts, their names and photos securely encrypted and provide most secure ways to exchange them - using QR codes, as a message attachment or send a encrypted file. Messenger is high-load ready Messenger is based on industry-leading technologies of Server development for high-load systems. We took the positive experience of heaviest loaded Internet Statistics tracking servers and implemented Messenger server using them. REAL-LIVE SOLUTIONS: National messenger Corporate messenger B2C Messaging system, suitable for texting, calls, file sharing, capable for heavy-loads thanks to BlackTiger unique server infrastructure. It supports payments, including cryptocurrencies, and can be integrated with any crypto-exchange service, too. National messenger is ready to support local regulations and laws on legal wiretapping. National messenger is implemented in a traditional look-and-feel, making it easier for people who got used with other messengers, keeping the highest level of security. To comply local regulations, national messenger can be also not-anonymous. B2B messaging system, suitable for texting, calls, file sharing, which can be integrated in corporate IT infrastructure. It supports advanced documents management and additional security layers like Contact Genuine Check. Also it has account revocation feature and best-effort remote data wipe. Of course, all server infrastructure can be provided as a Cloud service or as a distribution to be deployed on corporate s dedicated servers.

TELECOM SECURITY OPERATION CENTER Holistic communications security approach is based on constant monitoring of telecom infrastructure security stated that is done in Telecom Security Operations Centre. Collecting multiple data and artificial intelligence tools allow to detect and prevent telecom crimes before they happen. 8 SS7 infrastructure Messenger alert SS7 infrastructure system Detects SS7 attacks and fraud. Monitoring hacckers SS7 activities is essential for telcos, banks, IOT dependent infrastructure Detects malicious information in corporate messengers or information leakages through messenger system GSM-bugs detection SS7 infrastructure Detection of unauthorized modems that are sending information from organization infrastructure.

BLACK TIGER COUNTERING CYBER TERRORISM info@blacktg.com www.blacktg.com +971 4 313 2071 Level 41, Emirates Towers, Sheikh Zayed Road, Dubai, UAE PO Box 31303 BLACK TIGER is worldwide brand of the Laboratory for cyber security methods implementa on LACSMI