Doha - 19/08/2014 Alessandro Scarafile Field Application Engineer Lorenzo Invernizzi Field Application Engineer Emad Shehata Key Account Manager Key Account.

Slides:



Advertisements
Similar presentations
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Advertisements

Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
02 | Install and Configure Team Foundation Server Anthony Borton | ALM Consultant, Enhance ALM Steven Borg | Co-founder & Strategist, Northwest Cadence.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Module 7: Fundamentals of Administering Windows Server 2008.
Topics 1.Product information 2.Distinct features 3.Building large systems with the Central Lock.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
VERSION 2.6 FAE Group Demo Guide. Remote Control System Demo In order to standardize the way how Remote Control System is presented and to maximize the.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
All rights reserved © 2005, Alcatel TAS WEBCONFERENCE.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
Kaspersky Small Office Security INTRODUCING New for 2014!
Page ADP Technology Training. 2 Page2 Confidential Copyright © 2007 Pearson Education, Inc. and/or one or more of its direct or indirect affiliates. All.
Maintaining and Updating Windows Server 2008 Lesson 8.
Remote Control System 7 Cyber intelligence made easy.
Standard Demo 1 © Hacking Team All Rights Reserved.
BLACKBERRY TECHNOLOGY PRESENTED BY SHAIK TABREZ (09J01A1225 )
Integrating Lawful Hacking with NiceTrack Target360° Daniele Milan, Hacking Team Omri Kletter, NICE Systems.
The Hacking Suite For Governmental Interception.
The Hacking Suite For Governmental Interception.
The Hacking Suite For Governmental Interception. Which are todays challenges? Encryption Cloud Mobility.
Main Features of iSafe All-in-One Keylogger Universal keylogger of isafe, Inc. Suitable for home parental control,corporate employee monitoring and cheating.
The Hacking Suite For Governmental Interception. Today’s topic: RCS installation vectors.
Best Free Key logger Download Computer & Internet Monitoring Software.
Best-in-class enterprise backup for the mobile enterprise Prepared for [Insert customer name] [Date}
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Part One: System administration Training Handouts.
The Hacking Suite For Governmental Interception.
Remote Control System 7 Cyber intelligence made easy Belgrade - 08/02/2012 Massimiliano Luppi Key Account Manager Alessandro Scarafile Field Application.
BUILD SECURE PRODUCTS AND SERVICES
Managing Windows Security
Business Intelligence
Fortinet NSE8 Exam Do You Want To Pass In First Attempt.
Cyber intelligence made easy.
Munix Healthcare Customer Profiling, Frequency Analysis, Location Mapping, Movement Analysis, Web Classification, Time Analysis, and much more …. Internet.
StreetSmart Mobile Workforce App Incorporates Microsoft Office 365 Outlook Add-In for Improved Field Worker Scheduling and Streamlined Invoicing OFFICE.
TrueSight Operations Management 11.0 Architecture
Munix for Education Content Filter, Bandwidth Control, Location Mapping, Movement Analysis, User Self Management Portal, Time Analysis, and much more ….
Users and Administrators
Module Overview Installing and Configuring a Network Policy Server
RCS v7 Infection Vectors
IoT Approach to Accommodation & Booking Related Web Services
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
2016 Citrix presentation.
Veeam Backup Repository
The Hacking Suite for Governmental Interception
Cyber intelligence made easy.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
Chapter 27: System Security
Office 365 Integration Enables WebUntis Users to Sign in Using Office 365 Account Information and to Export WebUntis Timetables Directly to Outlook OFFICE.
ForceManager Integrates with Office 365 Outlook Mail, Calendar, Contacts, Word, and Excel for a Smart, Fast, Intuitive Mobile CRM Sales Solution OFFICE.
Partner Logo Azure Provides a Secure, Scalable Platform for ScheduleMe, an App That Enables Easy Meeting Scheduling with People Outside of Your Company.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
The Hacking Suite for Governmental Interception
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
Information Security Awareness
HOW DO I KEEP MY COMPUTER SAFE?
Google for Education offering
Employee Monitoring Solution
6. Application Software Security
Securing web applications Externally
The Hacking Suite For Governmental Interception
Users and Administrators
Presentation transcript:

Doha - 19/08/2014 Alessandro Scarafile Field Application Engineer Lorenzo Invernizzi Field Application Engineer Emad Shehata Key Account Manager Key Account Manager

The Building Blocks

Remote Agent Secure Frontend Scalable Backend Infection Vectors

Complete solution, not a toolkit Totally developed by us

Remote agent Your personal 007

What can we collect?

Camera Messages Chat Microphone Contacts Calendars Calls Location Keystrokes Documents Passwords Visited websites And much more…

Runs on an event-driven logic Autonomous

Events When crossing the border Every day at midnight On hidden SMS On voice call Actions Start microphone recording Destroy the device Send collected data Take a camera snapshot

Many different events and actions Combine them to suit your needs

What if my target is security aware?

Invisible to target user Invisible to antivirus and anti-rootkits Anti-forensic measures

Evidence on remote device How can we collect it?

Internet connection Firewalls and proxies are passed through

WiFi Open and saved networks

GPRS / UMTS / 3G+ Avoid billing the target with custom APN

Where can I install the Agent?

Secure Frontend An invisible barrier

Agent is connecting to your servers Your identity must be kept secret

Configurable on-the-fly Evidence stays encrypted

Scalable Backend Your data vault

Scalable by design

Agents Collector Database x 300

Database Shard 1 Shard 2 Collector 1 Collector 2 Agents … … Collector N … … Shard N x 10000

Scale when you need Adding servers is transparent Load balancing is automatic

No database administration required Set & Forget backups Fast restore in 5 minutes

Real-time alerting Be informed on interesting events

Polished graphical console The whole system from a single point

Infection Vectors Deploy your forces

How can I deploy my agent?

When the target opens a document

0-day exploits pack Always up to date

While the target browses the web

Inject into downloaded applications Inject into web pages

Bob’s laptop Web site Internet Network Injector

Send your target an SMS

And many more…

Third-party Integration Combine your weapons

Easily integrate with your monitoring center

Demo time!