smartprotect - turrem group€¦ · market is focused predominantly on the ‘detection and...
TRANSCRIPT
smartprotectThreat Monitor
Brand Secure
Vulnerability Assessment
Malware Protection
Breach
www.turremgroup.com
AROUND-THE-CLOCK PROTECTION BY SKILLED SECURITY ANALYSTS!A Security Operations Centre (SOC) provides real-time protection against cyberthreats that bypass security technologies like
antivirus and firewalls – using advanced forensic tools, threat intelligence, and cybersecurity expertise.
Our fully integrated SOC Platform NOMAD is designed to detect not only known threats, but the unknown threats hiding
in the “grey”, which are not typically seen by traditional security measures.
Our ability to ingest from networks, endpoints, and cloud sources and then enrich and correlate that data in near real time,
enables our analysts to kill, quarantine, and isolate threats quickly on your behalf, usually within minutes.
Our analysts look into the forensic data around an event and turn it into something which is understandable to you. Beyond
performing continuous disruption and isolation of threats on networks and endpoints, we ensure every notification from our
security service is contextualised and actionable, before we escalate to our clients.
Technology can do a lot of the ‘heavy lifting’ and sifting for you, but humans are uniquely capable of knowing whether
something is “weird good” or “weird bad.” And more importantly, they know what questions to ask next.
Unlike traditional cybersecurity technologies like antivirus and firewalls, our NOMAD analysts looks for threats, rather than
waiting for the technology to send an alert. When an analyst sees something “weird”, they can apply logic and intuition
combined with historical data and threat intelligence to decide what to do about it – something that technology cannot
do on its own. This human analysis is essential in detecting unknown threats earlier, stopping cyberattackers in their tracks.
Proactive and intelligent threat detection!
Something technology can’t match.
Constant network monitoring by cyber security analysts who detect threats earlier, stopping cyber attacks in their tracks!
Managed detection and response (MDR) is one of the foundations of our service. It is built on our NOMAD platform which
utilises partner and defence technologies. NOMAD goes beyond other security services and unlike services from traditional
security service providers; it proactively detects advanced targeted attacks, which have bypassed your existing perimeter
controls.
We excel at helping companies that are struggling to deploy, manage, and use an effective combination of expertise and
tools to detect threats.
Contact us today for more information 0330 043 1723
turremgroup
smartprotect 1
THREAT MONITOR
Sophisticated Threat Detection!
The Threat Hunters - a diverse team equipped with the latest research and technology.
As digital hygiene specialists our threat monitor services incorporates leading edge managed detection and response
technology combined with ultra-secure hosting and highly trained personnel.
Cyberthreats are evolving at an alarming rate and they affect governments, enterprises, small businesses and the general
public.
Automation only defeats automation. You need people to defeat people. Our managed detection and response encompasses
a diverse threat hunting team with skills ranging from both offensive (red team) and defensive (incident response). We are
equipped with the latest research and technology, to battle and contain live attacks.
Contact us today for more information 0330 043 1723
Research driven intelligence
Our threat hunters specialise in seeking out live attackers that are using previously unseen tactics, techniques, and proce-
dures. They do this by incorporating research and intelligence from across our intelligence-gathering network and the wider
security community. This is then fed into our threat-monitoring platform, drawing from threat intelligence, the latest red
team learnings, public and private research, and known attacker behaviour, to eliminate false positives.
Threat hunting
We stay ahead of attackers. To identify anomalous behaviour, the team continually collects and analyses rich data from
across a customer’s estate, including endpoints, logs, sensors, and Office 365.
Live response to human adversaries
Detecting attacks without having the ability to respond, offers little in the way of protection. Our goal is to detect, respond
to, and contain an attack before the attacker’s objective is reached, often while the attack is happening. While much of the
market is focused predominantly on the ‘detection and containment of malware’, it lacks the mindset that the real threat is
a human attacker – a dynamic entity that can and will adapt techniques in real-time that can only be effectively countered
by an equally skilled and equipped hunt team.
turremgroup
smartprotect2
BRAND PROTECTIONAttacks on brands are escalating, both online and offline. The costs to business can be large, the management distraction
significant, and the worst consequences in corporate reputation can be truly catastrophic.
Traditional website trustmarks have been shown to be ineffective, and in some cases, can even advertise vulnerabilities to
cybercriminals. All too easily, they can be copied. So, rather than offering protection to website users, they are doing little
more than paying lip service to security.
Contact us today for more information 0330 043 1723
Enhancing your brand investment
Our unique and patented technology consists of more than simple website protection tools, and enhances the value
of brand investment. It does this by providing a deep level of reassurance to business partners – such as distributors,
agents, and resellers – that you have protected the branded asset at a fundamental level, and that they won’t be
competing with fake websites or fake products. In turn, your partners will have the confidence to invest more in
marketing your products and services.
Solving the trust problem with trustmarks
Internet trustmarks have lost credibility because they can easily be copied. Trustmarks are ubiquitous and, because
they can be so easily replicated, are nothing more than a commoditised branding exercise providing token reassurance
to website visitors. In some cases, trustmarks can actually make a website more vulnerable by advertising known
weaknesses to cybercriminals.
Managing the brand remotely, protecting your content
You can turn unauthorised iterations of your brand off and on at will from your dashboard giving you full control
anytime and anywhere without interference with your client or partner relationships. Your partner determines where
the seal appears, you control if it appears.
We also protect your content from copycats and plagiarists because it will detect when your IP has been duplicated
without your permission.
turremgroup
smartprotect 3
VULNERABILITY ASSESSMENT & PENETRATION TESTING
Stop wasting time manually testing your network!
Automatically find and implement new and existing equipment and test against our extensive vulnerability database.
The automated vulnerability assessment tool (AVAT) is a vulnerability assessment tool for networks of 1 to 2M nodes. It
performs an in-depth inspection for security weaknesses that can substantially reduce the cost of, and in some cases replace,
penetration testing. With each scan it will automatically find new equipment and services and add them to the inspection
schedule.
It then tests every node based on its characteristics and reports its responses to reveal security issues in equipment, operating
systems, and applications. You set the IP range to investigate and in a matter of hours and with no network downtime or
interruption of services, AVAT will generate detailed reports specifying network security weaknesses.
Our database of tests is updated daily with the most recently discovered security vulnerabilities.
The AVAT database includes over 10,000 known vulnerabilities and the updates include discoveries by our own team and
those discovered by corporate and private security teams around the world.
Simple, fast, and comprehensive assessments
Manual vulnerability assessment tools are problematical
for complicated networks because they take too many
man-hours to implement. They are therefore not
used very frequently. Assessment tools can be time-
consuming to set up and operate, are plagued by high
false positive rates, and cause network resource issues.
Network security and compliance challenges
The frequency and increasing severity of today’s security threats are forcing companies to:
Gets your tactical security work done routinely and quicklyProvides the fixes you and your staff need for fast mitigationBuys you time to focus on security strategyAutomatically scans new equipment, ports and applicationsScales to handle multiple networks, business units, countriesReduces your patch-work by identifying exactly what is needed
Simplify PCI-DSS, SOX, HIPAA and GDPR complianceStrengthen current network security processes and procedures to protect against attacks by both external and internal threatsDeploy new security solutions that span the entire networkRestrict customer and partner access and permissionsRespond to “Security Compliance” mandates, IT upgrades and internal policy changes
Contact us today for more information 0330 043 1723
turremgroup
smartprotect4
REALTIME WEBSITE MALWARE PROTECTIONIn this digital age, website malware is dominating and ever increasing. There are no “hacker proof” websites and cyber
criminals continuously launch automated and targeted attacks to penetrate websites and use them for illegal purposes.
The online threat landscape expands and evolves as more sophisticated and complex web malware is created and deployed
by cyber criminals. Hard to detect, modern malware infects consumers as well as enterprise users so no internet user is
protected from harmful malware lurking on a website.
Proactive and intelligent threat detection!
Something technology can’t match.
Constant network monitoring by cyber security analysts who detect threats earlier, stopping cyber attacks in their tracks!
What’s on offer?A website anti-malware scanner which detects malicious and suspicious activity on a website. The malware protection
service provides real-time website malware monitoring, scanning and instant notifications that allows a customer to act
quickly upon active threat detection. If activated our automated removal system will actively seek out the malicious code and
remove it from your website ensuring that the website is returned to normal operation as quickly as possible.
It comes packed with a simple installation process where a “protection file” is placed on the root of the website, once in
place we are able to scan all the internal files of your website which provides the maximum protection possible. Such “Server
Side” scanning is far superior to external scanning and ensures our unique automated removal service is able to remove the
malicious code quickly and efficiently.
Every time our system scans a website, it performs an in-depth analysis of the website content file by file. As a managed
service, we are able to customise the monitoring settings to suit each client’s specific needs efficiently.
Contact us today for more information 0330 043 1723
turremgroup
smartprotect 5
Are your business or employee credentials in the wrong hands?
Before it’s too late.
Sign up for instant alerts so you can take immediate remedial action!
BUSINESS BREACH DETECTIONOur Breach Detection service collects and analyses billions of leaked credentials from the surface and dark web. It provides
actionable analytics to reduce the risk to your organisation of breached information.
Our service notifies clients within seconds if an employee’s credentials are found online, so you can take immediate remedial
action.
We are often compared with the free breach services such as ‘haveibeenpwned’ which are great services for the consumer,
but for business there is a need for a more substantial and accurate solution.
Contact us today for more information 0330 043 1723
What’s on offer?
Below are some of the differentiators between our breach services and free ones:
Employees often sign up to third-party websites using enterprise email addresses without the knowledge of your IT security
or compliance teams. Data breaches are increasingly exposing organisations to serious threats such as credential attacks,
identity theft, targeted phishing, and fraud.
BreachAware provides a robust monitoring and alerting platform for business.
Our breach solution is designed with a focus on reporting, password detection, and integration with platforms such
as Jira, Slack, Hipchat, and others. This is achieved via our custom API.
Our solution allows you to monitor your entire supply chain – other solutions such as haveibeenpwned do not.
In our upcoming release we will include the facility to include any “digital asset” in addition to domain names.
Our solution has a much deeper pool of breached data. We have noticed that free services such as haveibeenpwned
tend to focus on the popular breaches that have made the news, whereas we try to include those and niche
breaches for a much richer solution.
Free services are used by many people and they do not provide them with any specific attention. The free services
also do not provide such solutions on a managed service basis alongside GDPR and Data Breach assistance.
Free services such as haveibeenpwned use automatic web scraping, which is very limited. Our discovery engine
covers much more of the deep and surface web.
turremgroup
smartprotect6
turremgroupWatchoak Business Centre
5 Chain Lane
Battle
East Sussex
TN33 0GB
www.turremgroup.com