THE CENTRAL SECURITY PLATFORM GUARDIAN360 IS PART OF THE INTERMAX GROUP.

Slides:



Advertisements
Similar presentations
Approaches to meeting the PCI Vulnerability Management and Penetration Testing Requirements Clay Keller.
Advertisements

ETHICAL HACKING A LICENCE TO HACK
Secure SharePoint mobile connectivity
Social media threats. Warning! May contain mild peril.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Principles of Information Technology
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
SiteLock Internet Security: Big Threats for Small Business.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
PCM2U Presentation by Paul A Cook IT SERVICES. PCM2U Our History  Our team has been providing complete development and networking solutions for over.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Speaker : YUN–KUAN,CHANG Date : 2009/10/13 Working the botnet: how dynamic DNS is revitalising the zombie army.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
C8- Securing Information Systems
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Chapter 6 of the Executive Guide manual Technology.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
7 Information Security.
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Small Business Security Keith Slagle April 24, 2007.
Module 11: Designing Security for Network Perimeters.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Chap1: Is there a Security Problem in Computing?.
Policies and Procedures Security+ Guide to Network Security Fundamentals Chapter 11.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Computer Security By Duncan Hall.
IT-Secrurity Cookbook Enter your login: Enter your password:
Chapter 8 Auditing in an E-commerce Environment
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
1 Figure 11-7: Mobilizing Users User Training  Security Awareness  Accountability Training  Self-Defense Training Social engineering threats and correct.
Module 7: Designing Security for Accounts and Services.
TS workshop 2004U. Epting, M.C. Morodo Testa - TS department1 Improving Industrial Process Control Systems Security Uwe Epting (TS/CSE) Maria Carmen Morodo.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
DDoS Things You Need To Know About DDoS Attacks DDoS.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Securing Information Systems
Information Systems Security
Securing Information Systems
LAND RECORDS INFORMATION SYSTEMS DIVISION
Year 10 ICT ECDL/ICDL IT Security.
Securing Information Systems
SAM Financial Services Cybersecurity Assessment
Security Essentials for Small Businesses
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Presentation transcript:

THE CENTRAL SECURITY PLATFORM GUARDIAN360 IS PART OF THE INTERMAX GROUP

What challenges do companies face today? Obligation to report data leaks Malware Spam DDoS attacks Phishing Weak passwords Audit burden GUARDIAN360 IS PART OF THE INTERMAX GROUP THE CENTRAL SECURITY PLATFORM

Obligation to report data leaks In effect since 1 January 2016 Organizations are obliged to report any data leaks to the Autoriteit Persoonsgegevens (Dutch Data Protection Authority) In some cases, there is also an obligation to report data leaks to persons When an organization does not act correctly, a maximum fine of € 820,000 is imposed Side effect: damage to the organization’s reputation and/or image GUARDIAN360 IS PART OF THE INTERMAX GROUP THE CENTRAL SECURITY PLATFORM Figure 1: Logo of the Dutch Data Protection Authority

Cybercrime is becoming “mainstream” Our dependency on technology is immense Increased connectivity also increases our vulnerability Online crime is just as major a problem as drug trafficking GUARDIAN360 IS PART OF THE INTERMAX GROUP THE CENTRAL SECURITY PLATFORM EnergyTransport Infrastructu re BanksHealthcareDefenceMediaEducation Figure 2: Cybercrime overview

Hackers try to invade networks and/or applications To get access to confidential information To steal money To use the network for DDoS attacks, spam or bitcoin mining Through vulnerabilities in servers, applications and network components Through malware, phishing and weak passwords GUARDIAN360 IS PART OF THE INTERMAX GROUP THE CENTRAL SECURITY PLATFORM Figure 3: Graphic representation of a network attack

Increased audit burden In order to comply with such standards as ISO27001, NEN7510 and DigID Guidelines such as the OWASP IT has come under increasing scrutiny of accountants GUARDIAN360 IS PART OF THE INTERMAX GROUP THE CENTRAL SECURITY PLATFORM Figure 4: Compliancy aspects

Summary Hackers can no longer be kept outside by simply locking the front door. Paying attention to open windows and back doors is also essential The main threat is within the organization instead of outside Both current legislation and your clients expect you to take measures regarding the protection of personal data GUARDIAN360 IS PART OF THE INTERMAX GROUP THE CENTRAL SECURITY PLATFORM

What does this mean for companies? Ensure all legal work is in order (processor’s agreement) Ensure awareness is created regarding information security – both with employees and clients Ensure vulnerabilities in IT environments are reduced to a minimum Ensure that procedures are drawn up, for example on how to create users, strong passwords and information sharing GUARDIAN360 IS PART OF THE INTERMAX GROUP THE CENTRAL SECURITY PLATFORM

Why Guardian360? GUARDIAN360 IS PART OF THE INTERMAX GROUP

Why do we want to help companies? In keeping with our leading principle of wanting to create a safe digital world, Guardian360 helps companies to develop a secure IT environment Every company and individual may expect their data to be secure, in order for everyone to confidently use the Internet and any applications Guardian360 does this by continuously scanning the security of systems and to report about them in clear terms GUARDIAN360 IS PART OF THE INTERMAX GROUP THE CENTRAL SECURITY PLATFORM

How do we help companies? Guardian360 identifies vulnerabilities Guardian360 identifies compliance risks Guardian360 examines whether your network is known to hackers Guardian360 lists weak password accounts Guardian360 tries to catch hackers more quickly Guardian360 proves that an organization is ‘in control’ GUARDIAN360 IS PART OF THE INTERMAX GROUP THE CENTRAL SECURITY PLATFORM

We adopt a pragmatic approach Many organizations have already considered their information security And have invested in firewalls, virus scanners and other means Guardian360 starts by examining whether this provides the security required And – together with your administrators/web developers – monitors your IT environment GUARDIAN360 IS PART OF THE INTERMAX GROUP THE CENTRAL SECURITY PLATFORM

Continuous information on vulnerabilities 8 scanners External and internal network scanning Web application scanning 70,000 vulnerabilities Every hour, every day Clear dashboard GUARDIAN360 IS PART OF THE INTERMAX GROUP THE CENTRAL SECURITY PLATFORM

GUARDIAN360 IS PART OF THE INTERMAX GROUP THE CENTRAL SECURITY PLATFORM Figure 5: Guardian360 Dashboard

GUARDIAN360 IS PART OF THE INTERMAX GROUP THE CENTRAL SECURITY PLATFORM Figure 6: Vulnerabilities overview

Solution-oriented Vulnerabilities can be remedied by: The company’s own IT department The company’s own web developer But also by Guardian360 security engineers Vulnerabilities can be remedied by: The company’s own IT department The company’s own web developer But also by Guardian360 security engineers GUARDIAN360 IS PART OF THE INTERMAX GROUP THE CENTRAL SECURITY PLATFORM Figure 7: Solution XXS scripting

Deviations from the standards are identified Guardian360 helps with compliancy regarding ISO27001 OWASP DigiD You now have continuous information on identifying non-compliance issues GUARDIAN360 IS PART OF THE INTERMAX GROUP THE CENTRAL SECURITY PLATFORM

GUARDIAN360 IS PART OF THE INTERMAX GROUP THE CENTRAL SECURITY PLATFORM Figure 8: Compliancy deviation overview

We try to catch hackers An intruder or hacker in your network despite all security efforts? Our silent ‘Canary’ alarm is activated! GUARDIAN360 IS PART OF THE INTERMAX GROUP THE CENTRAL SECURITY PLATFORM

How does Canary work? GUARDIAN360 IS PART OF THE INTERMAX GROUP THE CENTRAL SECURITY PLATFORM Figure 9: How Canary works

Easy to implement Central dashboard No network appliance No additional software required Platform and location independent (local/datacentre/cloud) You can be scanned within one working day You are charged based on a subscription per employee, website and/or network component a month Compliancy module, Canary and service tickets are optional You are charged based on a subscription per employee, website and/or network component a month Compliancy module, Canary and service tickets are optional GUARDIAN360 IS PART OF THE INTERMAX GROUP THE CENTRAL SECURITY PLATFORM

Lloyd’s certified Guardian360 B.V. is certified for ISO ISO 9001 NEN 7510 GUARDIAN360 IS PART OF THE INTERMAX GROUP THE CENTRAL SECURITY PLATFORM Figure 10: LLOYD’S REGISTER LRQA

The Guardian360 organization 100% Dutch organization, based in Rotterdam Part of the Intermax group Over 20 years of internet experience Ethical hackers & penetration testers Security engineers & secure software developers GUARDIAN360 IS PART OF THE INTERMAX GROUP THE CENTRAL SECURITY PLATFORM Figure 11: Rotterdam Roots

More information? Call us on: +31 (0) linkedin.com/company/guardian360-b-v- GUARDIAN360 IS PART OF THE INTERMAX GROUP THE CENTRAL SECURITY PLATFORM Figure 12: Guardian360 Canary