Contextual Security Intelligence Suite™ Preventing Data Breaches without Constraining Business
TRADITIONAL APPROACHES ARE NOT ENOUGH… Impossible to pre-define all rulesConstant fear of breachesActivities without context
HUMANS ARE THE NEW PERIMETER ”Professionals target people. And any solutions will have to target the people problem, not the math problem”
CONTEXTUAL SECURITY INTELLIGENCE Discover Anomalies Investigate & Respond Monitor Activities Profile Users CSI Immediate reaction Real-time knowledge of all actions Recognition of the unusual Norm and pattern recognition and learning
BENEFIT AREAS OF CSI Intervention in the kill chain Breach Prevention Behavior Intelligence Efficient forensics Security Operations Initiation of new policies Compliance ROI Breach & account risk detection Risk Assessment Risk Compliance Breach Operations Discover Anomalies Investigate & Respond Monitor Activities Profile Users CSI
BREACH PREVENTION Breach Discover Anomalies Investigate & Respond Monitor Activities Profile Users CSI ●Unusual behavior patterns ●Insider threats and hijacked accounts ●APT Kill Chain
SECURITY OPERATIONS Operations Discover Anomalies Investigate & Respond Monitor Activities Profile Users CSI ●Response & forensics capabilities ●Real-time notificatin & alerting ●Automated security reactions & intervention
RISK ASSESSMENT Risk Discover Anomalies Investigate & Respond Monitor Activities Profile Users CSI ●Account and global risk estimation ●Identifying policy violations ●Gap between privileges and actual behavior
COMPLIANCE Compliance Discover Anomalies Investigate & Respond Monitor Activities Profile Users CSI ●Audit and review ●Integration with existing systems ●Prioritize and highlight critical areas
Instant access to data Centralized data collection Data delivery for analytics Filtering and normalization Vast amount of data Access and monitoring CONTEXTUAL SECURITY INTELLIGENCE SUITE 12 Enriched Data Platform Manage all access points Transparent monitoring Visualize commited actions Movie-like replay & search Machine learning of activities Anomaly Detection Real-time intervention Risk scoring and alerting The User Perspective Behavioural Analytics The Problem The Solution CSI.DATA CSI.USER CSI.RISK Not asked and not known
ARCHITECTURE - SIMPLIFIED
PREVENTION BY MONITORING LET’S EXAMINE A HUMAN ATTACK! Initial intrusion Time-frame for preventionForensics Outbound connection Expand accessStrengthen foothold Exfiltrate data 9 Cover tracks
CONTEXTUAL SECURITY INTELLIGENCE SUITE IN ACTION Privileged User User Profiles Login Time Login Location Host login Commands Keystrokes Mouse Applications Peer groups Privileged User Behavior Analytics Log Activity Log Activity Session Activity Session Activity
CONTEXTUAL SECURITY INTELLIGENCE SUITE IN ACTION Privileged Imposter User Profiles Login Time Login Location Host login Commands Keystrokes Mouse Applications Peer groups Privileged User Behavior Analytics Log Activity Log Activity Session Activity Session Activity Discover Security Operations Center
CONTEXTUAL SECURITY INTELLIGENCE SUITE IN ACTION Privileged Imposter User Profiles Login Time Login Location Host login Commands Keystrokes Mouse Applications Peer groups Privileged User Behavior Analytics Log Activity Log Activity Session Activity Session Activity Discover Security Operations Center Investigate Respond
HIGHLY VISUAL INTERFACE IT IS THE REAL-TIME DASHBOARD
HOW IS CSI DIFFERENT? Traditional security approachContextual security approach Manually definedSelf learning Enforcing controlReal-time knowledge & interaction Security damages continuityMore Security with more freedom ROI only when accatckedImmediate visibility of ROI Partial visionFull knowledge of all actions
London Tower 42, 25 Old Broad Street, London EC2N 1HN Paris 105, rue Jules Guesde, Levallois Perret New York 40 Wall St. 28th Floor, NYC, NY Munich Stefan-George-Ring 29. D München 200+ employees > 50% y/y growth over year 100+ resellers 600 Customers Budapest Alíz street 2. H-1117 Budapest
Follow us!
THANK YOU Follow us!