verint cyber...

Post on 18-Oct-2020

1 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 1

Intelligence Powered Security TM

VERINT Cyber Intelligence

Daniel Vitlis

November 2017

Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 2 Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 2

Verint is a global provider of security and intelligence

data mining software that helps governments, critical

infrastructure providers and enterprises to neutralize

and prevent terror, crime and cyber threats

Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 3

Security Solutions Built on Powerful Foundations

$1+ Billion Revenue in NASDAQ

5000 Employees

$1B R&D Investment over 10 years

6 R&D Centers

15 Global Offices

700+ Patents

Actionable

Intelligence

Intelligence

Powered

Security

Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 4

Understanding the Need for a Comprehensive Solution

Intelligence

Needs/Tasks

Technology + Methodology

Security

Challenges

Organization

&

User Type

Law Enforcement

National Security

National Intelligence

Critical Infrastructure

Military & Special Forces

Enterprise

Collection Assessment Operation

Terror Border

Protection Cyber

Attacks Illegal

Immigration Violence &

Crime Poaching

Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 5

Technology developed in-

house based on intelligence

domain expertise

Network

Intelligence

Tactical

Intelligence

Web

Intelligence

Satellite

Intelligence

Lawful Interception

Compliance

Advance Content

Extraction

Cyber

Security

Situational

Awareness

Intelligence

Fusion

Comprehensive & Unified Intelligence Comprehensive & Unified Intelligence

Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 6

Intelligence Powered Cyber Security

© 2017 Verint Systems Inc. All Rights Reserved Worldwide 7 © 2017 Verint Systems Inc. All Rights Reserved Worldwide 7

Scour the open, deep and dark web for • Planned and ongoing

campaigns

• Exploit and vulnerability commerce

• Indicators of system breach and data leaks

The Surface Googleland

The Deep Web -Co

The Dark Web Tor, Darknets, Dark Markets

#1 Extend Beyond the Organization

#2 Holistic kill chain coverage

#3 Automate the Hunt

#4 Simplify SOC Operations

© 2017 Verint Systems Inc. All Rights Reserved Worldwide 8

Malware Attacks: Attackers WILL Eventually Bypass Every Prevention Method

© 2017 Verint Systems Inc. All Rights Reserved Worldwide 9 © 2017 Verint Systems Inc. All Rights Reserved Worldwide 9

Built-in detection engines and forensics working in unison • Monitor Network and Endpoints

• Endpoint Detection

• Command and Control

• Lateral Movement

• Behavioral Analytics

• Proactive Forensics

#2 Holistic

Kill Chain Coverage

#3 Automate the Hunt

#4 Simplify SOC Operations

#1 Extend Beyond the Organization

© 2017 Verint Systems Inc. All Rights Reserved Worldwide 10 © 2017 Verint Systems Inc. All Rights Reserved Worldwide 10

#3

Automate the Hunt

#4 Simplify SOC Operations

#1 Extend Beyond the Organization

#2 Holistic Kill Chain Coverage

1. Extract Leads

2. Create an Intelligence

Map

3. Expand the Map

4. Evaluate The Findings

5. Decide on next step

File Analysis

Endpoint Analysis

Command & Control

Network & Lateral

Movement

Automated Investigation

Attack patterns

& profiles

Incident Storylines

Multi Vector Detection

Forensics

© 2017 Verint Systems Inc. All Rights Reserved Worldwide 11 © 2017 Verint Systems Inc. All Rights Reserved Worldwide 11

#4 Simplify

SOC Operations

#3 Automate the Hunt

Reduce the number of security tools, accelerate analyst onboarding and lower the skills barrier

• Single pane of glass

• Prioritize incidents

• Orchestrated response

#1 Extend Beyond the Organization

#2 Holistic Kill Chain Coverage

© 2017 Verint Systems Inc. All Rights Reserved Worldwide 12

Government Office

Global Enterprise

National Scale

Critical Infrastructure

Intelligence Powered Cyber Security

TPS Cyber Threat

Protection System

iSOC Intelligence-Driven

Security Operation Center

NDC National Cyber Defense Center

Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 13

Thank you

top related