the smart defend story book

16
tagline text here: 21pt smartdefend your total cyber defence solution

Upload: smart-defend-uk-limited

Post on 22-Jul-2016

225 views

Category:

Documents


0 download

DESCRIPTION

Welcome to Smart Defend UK. Our business has a dynamic story to tell about the future of managed security services. In this story book you’ll get an overview of the company, its products and services, and its mission to tackle the intensifying threat from cybercrime.

TRANSCRIPT

Page 1: The Smart Defend Story Book

tagline text here: 21pt

smartdefend

your total cyber defence solution

Page 2: The Smart Defend Story Book

Hello and welcome to Smart Defend UK Limited. Our business has a dynamic story to tell about the future of managed security services. In this document you’ll get an overview of the company, its products and services, and its mission to tackle the intensifying threat from cybercrime. We look forward to welcoming you as a customer, partner or colleague in the journey to make everyone’s online life and business safer.

Sincerely,

Naomi LedshamOperations Director

welcome

Page 3: The Smart Defend Story Book

Emerging managed security services player

Smart Defend UK is an emerging expert player in the cybersecurity industry. We have developed market-leading patented technology to provide a more robust defence against the escalating threat from cybercriminal activity. This technology is now gaining wider recognition for its unique features as it becomes available internationally.

Supporting law enforcement internationally

We work closely and are constantly forging new relationships with law enforcement, government and regulatory agencies as part of a coordinated international effort to improve individual and business safety online.

End to end security solutions

As a business, we offer ‘cybersecurity as a service’ through a suite of products that support businesses large and small, from the website to the server, to the desktop and to mobile devices. Alongside our security monitoring operations, we also offer more standard infrastructure monitoring. Independent of our own products and services, we consult to various large organisations, giving them unbiased advice to ensure they get the most appropriate toolkit for their particular IT security needs.

UK headquartered, international group

Headquartered in Battle, Sussex in the UK, Smart Defend UK Limited is part of the Smart Defend Group which has satellite operations in Slovenia, Germany, Canada and the United States, all of which play an active part in our global security monitoring operations and software development program.

about us

Page 4: The Smart Defend Story Book

Responding to exponential threat

Criminality in the digital space is constantly evolving. As technology changes now so quickly, its complexity expands exponentially, confronting users with constant novelty. This creates vulnerabilities, both human and technological, that resourceful criminals can attack. And they do. Vigorously.

Deep cybercrime expertise

Our core capabilities were honed in some of the toughest emerging market conditions where trust in online transactions has had less time to become established. Consumers there have required clearer validation they were transacting on sites that were both legitimate and creditworthy. As a consequence, our software developers and security analysts have had to develop more versatile skills and robust tools as part of a professional mission to keep ahead of the cybercriminal.

Smart Defend now has market-leading products for more general application because we can detect and respond to malicious activity in seconds rather

than days. Businesses and their customers are better protected and law enforcement agencies are given a major advantage in their fight against cybercrime.

Unique eIDAS-ready patented technology

Smart Defend’s core patented technology is unique in its field and we expect it to play a central role in the new regulatory infrastructure envisaged by the EU’s eIDAS initiative. The EU’s stated goal is to boost trust and convenience in secure and seamless cross-border electronic transactions by promoting the use of electronic identification and trust services (eIDAS services).

While the first wave of eIDAS relates to public bodies, the private sector will likely follow because there will be competitive advantage in demonstrating customer security as well as corporate governance compliance pressures. Smart Defend’s products are among the most advanced eIDAS technologies on the market.

why use us?

Page 5: The Smart Defend Story Book
Page 6: The Smart Defend Story Book

our productsSME to corporate, website to mobile device

Smart Defend has created a suite of products with a range of features and price points to serve organisations of all sizes, from SMEs to major corporates and public bodies. We are building out an end-to-end managed security solution for the entire network infrastructure to cover the website, desktop, server and mobile device.

Unique URL verification and personal signature technology

Because of Smart Defend’s patented technology, we can offer a more comprehensive suite of protection options than other security companies. In particular, our unique URL verification and personal signature technologies cannot be replicated by the major vendors. We offer keylogging protection, daily vulnerability scanning, anti-malware, anti-phishing, firewall protection, host intrusion protection, and PCI scanning, as well as more generally available defences such as anti-virus, attack prevention, internet access restriction and web filtering.

smartdefend SME

smartdefend SME applies our unique patented anti-phishing technology to assure website customers a safe browsing experience by embedding our interactive website SEAL. This can’t be replicated by a malicious site without alerting our global network security monitors within seconds.

smartdefend Pro

smartdefend Pro combines all the required tools to provide a robust and stable solution to the general protection needs of website owners. This service incorporates our unique defence technology against phishing and brand attacks which will alert you if a cybercriminal is attempting an attack on your website. We provide you with a daily vulnerability scan which examines your web pages, applications and web servers for security vulnerabilities that would give hackers an opportunity to do damage. There is nothing to install and our tests will not disturb your site or visitors.

Page 7: The Smart Defend Story Book
Page 8: The Smart Defend Story Book

smartdefend Ultimate

To further enhance your reputation and legal compliance as part of smartdefend Ultimate, we provide you with a quarterly Payment Card Industry (PCI) scan certificate. The PCI Data Security Standard (PCI DSS) is a set of requirements designed to ensure that all companies processing, storing or transmitting credit card information maintain a secure environment.

The idea of a website or environment that is immune to security issues is false. The ability to detect when incidents occur is fundamental to the establishment of a good security posture for your website. The smartdefend Ultimate product continuously monitors your website, providing immediate alerts in the event of a security incident such as a malware infection.

smartdefend GuardedID®

smartdefend GuardedID® runs alongside antivirus software to fill an important gap in protecting the keyboard. Unlike antivirus and anti-malware, GuardedID® is the only proactive solution to provide the critical security functionality necessary for protecting your data:

real-time keystroke encryption

128-bit out-of-band data channel

enterprise deployment kit

anti-screen scraping

anti-clickjack warning

self-monitoring kernel module

GuardedID® takes a proactive approach to stopping malicious keylogging programs by encrypting every keystroke at the point of typing the keys, and rerouting those encrypted keystrokes directly to your browser through its own unique path. GuardedID® bypasses the typical places keyloggers normally reside,

our products

Page 9: The Smart Defend Story Book

thereby helping to eliminate your vulnerability to keylogging attacks, which could compromise your personal information causing you financial losses.

GuardedID® is designed as a toolbar for your browser, always present when your browser is launched. With GuardedID®, you can now work offline securely as well as email, browse, shop and bank online with confidence knowing that each and every keystroke is protected and not being transmitted to an awaiting identity thief. With 12,000 keyloggers known to be in distribution currently, it is only a matter of time before one affects one of your computers.

smartdefend MobileTrust™

MobileTrust™ is the most advanced security suite for Apple or Android devices. Mobile devices are increasingly used to augment the corporate desktop and are now a prime target for hackers looking to breach the corporate network.

The MobileTrust™ bundle includes six of the most powerful security features that are must-haves for every enterprise mobile user:

password vault – securely stores an unlimited number of passwords with associated websites

encrypted keyboard and browser – encrypts all keystrokes between the on-screen keyboard and the browser

strong password creator – creates strong passwords based on user-defined preferences and stores them in the password vault for future use

ProtectID® soft token – one-time-password generator for StrikeForce’s award-winning authentication platform; features a one-touch user enrolment, supports on-premise and cloud deployments

OATH-compliant soft token – works with all OATH compliant authentication systems

encrypted database – store notes and data in user defined fields in a secure database

Page 10: The Smart Defend Story Book

our servicesAutomation blended with expert analysis

Protecting your brand, evolving your products and services, growing your customer base, returning value to shareholders, and maintaining competitive advantage hinges on data security. In the past, when individual hackers used ‘smash-n-grab’ methods to steal data, protection strategies were straightforward.

But the threat landscape has become more complex. Hackers are more organised, using multi-vector attacks to penetrate your environments, conceal their presence, and steal as much of your data as possible.

In addition to automated analysis and detection, we apply rigorous human analysis to all security events generated by our data correlation processing from within our proprietary network operation centre (NOC) and security operation centre (SOC).

Fewer false positives

Automated security analysis on its own produces a high rate of false positives. This is costly for the customer because it wastes management time tracking

whether an alert reflects a genuine security event.

By outsourcing to Smart Defend, you bring more human experience and technology to bear to weed out the false positives and focus resources on following up genuine threats, minimising management distraction.

Remote operation

Smart Defend’s solutions operate remotely, removing the need for customers to host complex and costly technologies on their own premises. Smart Defend relies on data alone from the customer.

Every day, new malicious threats to your enterprise emerge. Our system gets regular updates from the field to make sure vulnerabilities are always identified.

Unparalleled visibility

Our solution aggregates and analyses data from many sources within the customer environment, providing unparalleled visibility into all activities, whether internally or externally driven. We look for all the signs of a potential breach within an organisation, be it from a phone, laptop, desktop, server, or router.

Page 11: The Smart Defend Story Book

Many tools today are single purpose, focusing only on event management or compliance functions. Our solution combines these capabilities with an integrated intrusion detection system, log and asset management, and many other tools like antivirus to gain maximum flexibility and visibility, all in a single implementation.

Intrusion Detection System (IDS)

Our IDS monitors your environment and sends alerts when there is any suspicious activity. Because both internal and external violations can cause issues, we analyse activity to determine deviations from the norm.

We will help you implement a game plan for fast, effective response when an alarm is triggered.

Managed Antivirus

Our comprehensive endpoint security solution combines managed antivirus, content filtering, user policies, scheduling and other tools to keep all devices secure. It can block malicious websites, allow selective access to specific sites, see live status of all systems, and report and alert on all of these capabilities.

Security Log Management

Compliance and litigation environments increasingly call for log collection and monitoring, which are also important parts of maintaining visibility into your systems. Correlating logs from all of your preventative systems is essential to quickly identifying and remediating security incidents. Our Security Log Management system will forensically sign and validate all logs for authenticity and accuracy in long-term storage and investigations.

Managed IT Services

Managing security overlaps with general IT monitoring, so in addition to our security-driven solutions we also offer general IT managed services. Our SmartCare Managed IT Services give you the benefits of a managed service provider relationship for all your software and hardware needs and remove the expense of doing it all in-house, providing proactive monitoring and complete umbrella backups.

Page 12: The Smart Defend Story Book

consultancyDealing with complexity

Large enterprises, particularly those which have grown through acquisition or with rapidly changing marketplace dynamics, can be extraordinarily complex, particularly when it comes to their technological infrastructure. Managing that infrastructure for security in the face of the escalating threat from cybercrime is a tough task for in-house IT managers.

Risk management

Risk management is central to modern IT, protecting customer, staff and shareholder interests, defending the fundamental integrity of the firm, its brand and operational efficiency. Mapping IT activity to meet specific regulatory requirements, or more general corporate governance standards, delivers a challenge all the way from the engine room to the boardroom.

Acknowledging the gravity of these challenges, Smart Defend provides our in-house expertise of the security threat and our extensive knowledge of commercial responses to help firms identify the best policies and technologies for their unique circumstances.

Unbiased advice

As consultants, we provide unbiased advice independent of our own sales solutions. We assess your existing infrastructure and plans for the future. We examine the current threat landscape and your likely vulnerabilities. Then we build a strategic security plan for you, mapping the appropriate market-based technologies to meet your specific needs.

We introduce you to the specific vendors who best suit your security needs and manage those multiple relationships for you, ensuring a coherent solution removing for you a layer of management complexity.

So whether it is meeting the latest regulatory requirement, being ready to anticipate the next shift in regulation, providing a helicopter perspective on corporate governance best practice, or understanding which technologies will scale to your future needs, we can help. Our consultants will give you peace of mind that you have the most appropriate set of policies, technologies and investment plans in place for all eventualities and in the most cost-effective solution.

Page 13: The Smart Defend Story Book

complianceCompliance Management Security System

Regulatory breaches can be costly to the firm in bad press, fines, brand damage and lost customers. The regulatory framework can only get more demanding for IT departments. The issue is an agenda item for all boards as they grapple with the tighter demands on corporate governance from legislation such as Sarbanes-Oxley.

Companies are often unaware that there is a simplified and hands-off approach to compliance that is more efficient and effective. Instead of piecing together several different software applications and vendors, Smart Defend offers a one-step solution to compliance that will ensure critical manual updates are never missed again. We call it our Compliance Management Security System.

With their easy-to-read dashboard and reporting centre, Smart Defend’s automated systems mean you don’t need to worry about your next audit; our continual compliance will anticipate what you will need and make sure you’re prepared.

PCI DSS

At the front of commercial online transactional compliance is the Payment Card Industry Data Security Standard (PCI DSS). For some firms this can be a significant headache. Our auditor-tested PCI DSS software removes the element of human error, making compliance not only possible but easy to maintain.

Data protection

Recent hacking controversies have made personal data protection one of the hottest topics in the press. Public concern over personal records increases, particularly with regard to healthcare. So, meeting and even exceeding legislative requirements should be central to a security risk-management approach.

Forensics

Employee malfeasance is a growing risk, particularly in finance. Global enterprises may be required to produce data by law enforcement or litigators, no matter where the data was created. Our system will forensically sign all logs to validate their authenticity and accuracy.

Page 14: The Smart Defend Story Book

collaborationWorking for a safer cyber future

The engine of technological innovation will continue to drive forward, and at an accelerating pace. It will create commercial opportunities for firms and individuals who embrace it and solve many economic and social problems that once seemed intractable. The Internet of Things, 3D printing, and wearable devices promise previously unimaginable benefits.

But they also augur a substantial increase in the complexity of the technological environment through the enlarged network of connections these devices will create between their users and the wider social landscape. Like any new landscape, unprecedented dangers will emerge that will require adaptive behaviours by individuals and organisations.

Cybersecurity as a culture

Cybersecurity is a discipline at an individual level and a culture at a corporate level — a shared endeavour between various stakeholders. Smart Defend is an ambitious company committed to playing a central role in advancing this culture.

We will work with our customers, partners, regulators, law enforcement agencies and governments to create a safer social and economic landscape, one in which private data, commercial transactions and national security are robust in the face of malicious cyber activities.

Join us as we help build a safer cyber future.

Page 15: The Smart Defend Story Book

www.smartdefend.com

Smart Defend UK LimitedGlengorse

Battle

East Sussex

TN33 0TX

Registration: 08580810

[email protected] | 0800 368 8787 | +44 (0) 20 8434 7080

Page 16: The Smart Defend Story Book