smartprotect - turrem group€¦ · market is focused predominantly on the ‘detection and...

8
smartprotect Threat Monitor Brand Secure Vulnerability Assessment Malware Protection Breach www.turremgroup.com

Upload: others

Post on 27-May-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: smartprotect - Turrem Group€¦ · market is focused predominantly on the ‘detection and containment of malware’, it lacks the mindset that the real threat is a human attacker

smartprotectThreat Monitor

Brand Secure

Vulnerability Assessment

Malware Protection

Breach

www.turremgroup.com

Page 2: smartprotect - Turrem Group€¦ · market is focused predominantly on the ‘detection and containment of malware’, it lacks the mindset that the real threat is a human attacker

AROUND-THE-CLOCK PROTECTION BY SKILLED SECURITY ANALYSTS!A Security Operations Centre (SOC) provides real-time protection against cyberthreats that bypass security technologies like

antivirus and firewalls – using advanced forensic tools, threat intelligence, and cybersecurity expertise.

Our fully integrated SOC Platform NOMAD is designed to detect not only known threats, but the unknown threats hiding

in the “grey”, which are not typically seen by traditional security measures.

Our ability to ingest from networks, endpoints, and cloud sources and then enrich and correlate that data in near real time,

enables our analysts to kill, quarantine, and isolate threats quickly on your behalf, usually within minutes.

Our analysts look into the forensic data around an event and turn it into something which is understandable to you. Beyond

performing continuous disruption and isolation of threats on networks and endpoints, we ensure every notification from our

security service is contextualised and actionable, before we escalate to our clients.

Technology can do a lot of the ‘heavy lifting’ and sifting for you, but humans are uniquely capable of knowing whether

something is “weird good” or “weird bad.” And more importantly, they know what questions to ask next.

Unlike traditional cybersecurity technologies like antivirus and firewalls, our NOMAD analysts looks for threats, rather than

waiting for the technology to send an alert. When an analyst sees something “weird”, they can apply logic and intuition

combined with historical data and threat intelligence to decide what to do about it – something that technology cannot

do on its own. This human analysis is essential in detecting unknown threats earlier, stopping cyberattackers in their tracks.

Proactive and intelligent threat detection!

Something technology can’t match.

Constant network monitoring by cyber security analysts who detect threats earlier, stopping cyber attacks in their tracks!

Managed detection and response (MDR) is one of the foundations of our service. It is built on our NOMAD platform which

utilises partner and defence technologies. NOMAD goes beyond other security services and unlike services from traditional

security service providers; it proactively detects advanced targeted attacks, which have bypassed your existing perimeter

controls.

We excel at helping companies that are struggling to deploy, manage, and use an effective combination of expertise and

tools to detect threats.

Contact us today for more information 0330 043 1723

turremgroup

smartprotect 1

Page 3: smartprotect - Turrem Group€¦ · market is focused predominantly on the ‘detection and containment of malware’, it lacks the mindset that the real threat is a human attacker

THREAT MONITOR

Sophisticated Threat Detection!

The Threat Hunters - a diverse team equipped with the latest research and technology.

As digital hygiene specialists our threat monitor services incorporates leading edge managed detection and response

technology combined with ultra-secure hosting and highly trained personnel.

Cyberthreats are evolving at an alarming rate and they affect governments, enterprises, small businesses and the general

public.

Automation only defeats automation. You need people to defeat people. Our managed detection and response encompasses

a diverse threat hunting team with skills ranging from both offensive (red team) and defensive (incident response). We are

equipped with the latest research and technology, to battle and contain live attacks.

Contact us today for more information 0330 043 1723

Research driven intelligence

Our threat hunters specialise in seeking out live attackers that are using previously unseen tactics, techniques, and proce-

dures. They do this by incorporating research and intelligence from across our intelligence-gathering network and the wider

security community. This is then fed into our threat-monitoring platform, drawing from threat intelligence, the latest red

team learnings, public and private research, and known attacker behaviour, to eliminate false positives.

Threat hunting

We stay ahead of attackers. To identify anomalous behaviour, the team continually collects and analyses rich data from

across a customer’s estate, including endpoints, logs, sensors, and Office 365.

Live response to human adversaries

Detecting attacks without having the ability to respond, offers little in the way of protection. Our goal is to detect, respond

to, and contain an attack before the attacker’s objective is reached, often while the attack is happening. While much of the

market is focused predominantly on the ‘detection and containment of malware’, it lacks the mindset that the real threat is

a human attacker – a dynamic entity that can and will adapt techniques in real-time that can only be effectively countered

by an equally skilled and equipped hunt team.

turremgroup

smartprotect2

Page 4: smartprotect - Turrem Group€¦ · market is focused predominantly on the ‘detection and containment of malware’, it lacks the mindset that the real threat is a human attacker

BRAND PROTECTIONAttacks on brands are escalating, both online and offline. The costs to business can be large, the management distraction

significant, and the worst consequences in corporate reputation can be truly catastrophic.

Traditional website trustmarks have been shown to be ineffective, and in some cases, can even advertise vulnerabilities to

cybercriminals. All too easily, they can be copied. So, rather than offering protection to website users, they are doing little

more than paying lip service to security.

Contact us today for more information 0330 043 1723

Enhancing your brand investment

Our unique and patented technology consists of more than simple website protection tools, and enhances the value

of brand investment. It does this by providing a deep level of reassurance to business partners – such as distributors,

agents, and resellers – that you have protected the branded asset at a fundamental level, and that they won’t be

competing with fake websites or fake products. In turn, your partners will have the confidence to invest more in

marketing your products and services.

Solving the trust problem with trustmarks

Internet trustmarks have lost credibility because they can easily be copied. Trustmarks are ubiquitous and, because

they can be so easily replicated, are nothing more than a commoditised branding exercise providing token reassurance

to website visitors. In some cases, trustmarks can actually make a website more vulnerable by advertising known

weaknesses to cybercriminals.

Managing the brand remotely, protecting your content

You can turn unauthorised iterations of your brand off and on at will from your dashboard giving you full control

anytime and anywhere without interference with your client or partner relationships. Your partner determines where

the seal appears, you control if it appears.

We also protect your content from copycats and plagiarists because it will detect when your IP has been duplicated

without your permission.

turremgroup

smartprotect 3

Page 5: smartprotect - Turrem Group€¦ · market is focused predominantly on the ‘detection and containment of malware’, it lacks the mindset that the real threat is a human attacker

VULNERABILITY ASSESSMENT & PENETRATION TESTING

Stop wasting time manually testing your network!

Automatically find and implement new and existing equipment and test against our extensive vulnerability database.

The automated vulnerability assessment tool (AVAT) is a vulnerability assessment tool for networks of 1 to 2M nodes. It

performs an in-depth inspection for security weaknesses that can substantially reduce the cost of, and in some cases replace,

penetration testing. With each scan it will automatically find new equipment and services and add them to the inspection

schedule.

It then tests every node based on its characteristics and reports its responses to reveal security issues in equipment, operating

systems, and applications. You set the IP range to investigate and in a matter of hours and with no network downtime or

interruption of services, AVAT will generate detailed reports specifying network security weaknesses.

Our database of tests is updated daily with the most recently discovered security vulnerabilities.

The AVAT database includes over 10,000 known vulnerabilities and the updates include discoveries by our own team and

those discovered by corporate and private security teams around the world.

Simple, fast, and comprehensive assessments

Manual vulnerability assessment tools are problematical

for complicated networks because they take too many

man-hours to implement. They are therefore not

used very frequently. Assessment tools can be time-

consuming to set up and operate, are plagued by high

false positive rates, and cause network resource issues.

Network security and compliance challenges

The frequency and increasing severity of today’s security threats are forcing companies to:

Gets your tactical security work done routinely and quicklyProvides the fixes you and your staff need for fast mitigationBuys you time to focus on security strategyAutomatically scans new equipment, ports and applicationsScales to handle multiple networks, business units, countriesReduces your patch-work by identifying exactly what is needed

Simplify PCI-DSS, SOX, HIPAA and GDPR complianceStrengthen current network security processes and procedures to protect against attacks by both external and internal threatsDeploy new security solutions that span the entire networkRestrict customer and partner access and permissionsRespond to “Security Compliance” mandates, IT upgrades and internal policy changes

Contact us today for more information 0330 043 1723

turremgroup

smartprotect4

Page 6: smartprotect - Turrem Group€¦ · market is focused predominantly on the ‘detection and containment of malware’, it lacks the mindset that the real threat is a human attacker

REALTIME WEBSITE MALWARE PROTECTIONIn this digital age, website malware is dominating and ever increasing. There are no “hacker proof” websites and cyber

criminals continuously launch automated and targeted attacks to penetrate websites and use them for illegal purposes.

The online threat landscape expands and evolves as more sophisticated and complex web malware is created and deployed

by cyber criminals. Hard to detect, modern malware infects consumers as well as enterprise users so no internet user is

protected from harmful malware lurking on a website.

Proactive and intelligent threat detection!

Something technology can’t match.

Constant network monitoring by cyber security analysts who detect threats earlier, stopping cyber attacks in their tracks!

What’s on offer?A website anti-malware scanner which detects malicious and suspicious activity on a website. The malware protection

service provides real-time website malware monitoring, scanning and instant notifications that allows a customer to act

quickly upon active threat detection. If activated our automated removal system will actively seek out the malicious code and

remove it from your website ensuring that the website is returned to normal operation as quickly as possible.

It comes packed with a simple installation process where a “protection file” is placed on the root of the website, once in

place we are able to scan all the internal files of your website which provides the maximum protection possible. Such “Server

Side” scanning is far superior to external scanning and ensures our unique automated removal service is able to remove the

malicious code quickly and efficiently.

Every time our system scans a website, it performs an in-depth analysis of the website content file by file. As a managed

service, we are able to customise the monitoring settings to suit each client’s specific needs efficiently.

Contact us today for more information 0330 043 1723

turremgroup

smartprotect 5

Page 7: smartprotect - Turrem Group€¦ · market is focused predominantly on the ‘detection and containment of malware’, it lacks the mindset that the real threat is a human attacker

Are your business or employee credentials in the wrong hands?

Before it’s too late.

Sign up for instant alerts so you can take immediate remedial action!

BUSINESS BREACH DETECTIONOur Breach Detection service collects and analyses billions of leaked credentials from the surface and dark web. It provides

actionable analytics to reduce the risk to your organisation of breached information.

Our service notifies clients within seconds if an employee’s credentials are found online, so you can take immediate remedial

action.

We are often compared with the free breach services such as ‘haveibeenpwned’ which are great services for the consumer,

but for business there is a need for a more substantial and accurate solution.

Contact us today for more information 0330 043 1723

What’s on offer?

Below are some of the differentiators between our breach services and free ones:

Employees often sign up to third-party websites using enterprise email addresses without the knowledge of your IT security

or compliance teams. Data breaches are increasingly exposing organisations to serious threats such as credential attacks,

identity theft, targeted phishing, and fraud.

BreachAware provides a robust monitoring and alerting platform for business.

Our breach solution is designed with a focus on reporting, password detection, and integration with platforms such

as Jira, Slack, Hipchat, and others. This is achieved via our custom API.

Our solution allows you to monitor your entire supply chain – other solutions such as haveibeenpwned do not.

In our upcoming release we will include the facility to include any “digital asset” in addition to domain names.

Our solution has a much deeper pool of breached data. We have noticed that free services such as haveibeenpwned

tend to focus on the popular breaches that have made the news, whereas we try to include those and niche

breaches for a much richer solution.

Free services are used by many people and they do not provide them with any specific attention. The free services

also do not provide such solutions on a managed service basis alongside GDPR and Data Breach assistance.

Free services such as haveibeenpwned use automatic web scraping, which is very limited. Our discovery engine

covers much more of the deep and surface web.

turremgroup

smartprotect6

Page 8: smartprotect - Turrem Group€¦ · market is focused predominantly on the ‘detection and containment of malware’, it lacks the mindset that the real threat is a human attacker

turremgroupWatchoak Business Centre

5 Chain Lane

Battle

East Sussex

TN33 0GB

www.turremgroup.com