click here to read more

Click to edit Master title style
 Click to edit Master text styles

Second level

Third level

Fourth level
 Fifth level
Endpoint Threat Detection & Response-as-a-Service
Active Cyber Security, OnDemand
Because modern threats need a new model of security
STRICTLY PRIVATE & CONFIDENTIAL © 2015
1
STRICTLY PRIVATE & CONFIDENTIAL © 2015
 700+ customers, 15+ years, 450+ security experts.
 Recognition from Gartner, Forrester and Red Herring.
 Specialized security researchers, ethical hackers and security experts integrate business
 Click to edit
Master
text styles
context
intelligence,
threat data and cyber insights
About Paladion &
Paladion OnDemand = Cyber Security-as-a-Service for instant and robust cyber security
Paladion OnDemand
 Secondlevel
outcomes
 Thirdlevel
Pay-per-use model without making huge investments in software, hardware or security
skills.
 Fourth level
Click to edit Master title style
 Fifth level
GLOBAL
ASSOCIATIONS &
PUBLICATIONS
AWARDS &
RECOGNITIONS
STRICTLY PRIVATE & CONFIDENTIAL © 2015
Click to edit
Mastersolutions
title style
Traditional
protection
just cannot keep up!
 Click to edit Master text styles

Second level

Third level

Fourth level
 Fifth level
3
 Anti-virus cannot protect against APTs,
Unknown and Zero-Day attacks
 Rely on signatures & known behaviors
 Are easily detectable by attackers who
can evade or simply disable the
solution
 Network-based anti-APT technologies are
not enough for endpoints
 Bypassed with encryption, sandbox
evasion, social engineering and nonnetwork vectors
 Cannot execute incident response on
endpoints
 Security monitoring today does not cover
endpoint threat analysis & response
 Focused on logs from network devices
or apps
STRICTLY PRIVATE & CONFIDENTIAL © 2015
Click to Endpoint
edit Master
title
style & Response (ETDR)
Solution:
Threat
Detection
 Click to edit Master text styles

Second level

Third level

Stay on top of modern endpoint threats
with deeper detection and faster response
 24x7 threat monitoring of endpoints to
detect advanced threats
Fourth level
 Fifth level

Unknown malware, ransomwares,
rootkits, malicious system behavior

Impact/ changes post any compromise
 Immediate and centralized response

Triage to pinpoint systems showing
compromised behavior

Investigation and forensics to contain,
remove and recover from compromises
on endpoints
 Offered as a service: bundled technology
and skills on a pay-per use model
4
STRICTLY PRIVATE & CONFIDENTIAL © 2015
Click toDetection,
edit Master
title
style
Deeper
Faster
Response
  Detect
threats
that traditional
solutions
simply
Click
to edit
Master text
styles
cannot


Behavior-based monitoring to trace
 Signature-less,
Second level
unknown and previously unseen attacks
 Third
level
Accurately
detect
Indicators of Compromise (IOCs)
 Discover breach indicators and any known
 Fourth level
persistent threats on your endpoint
 Fifth level
 Get complete visibility
of risky endpoints


Continuous Monitoring to identify endpoints that
are compromised or are risky
Accurate View of key events that unfold as part of
attack
 Quickly investigate any alert or suspicious
activity

 Accurate analysis


Get all critical data required for investigation
from physical memory and disk with a single
click
Understand attacker behavior in real-time with
contextual attack data
 Quickly remediate with actionable intelligence
based on accurate context


5
Fast, accurate and complete hunting at scale to
quickly pinpoint compromised systems and find
scope of breach
Isolate lingering malicious files, kill processes
and remove accounts for immediate
containment
Reverse engineer the malware for attacker
attribution and eradication steps
Reduce time to investigate & respond from many
weeks & months to just a few minutes & hours
STRICTLY PRIVATE & CONFIDENTIAL © 2015
Click to by
edit
title style
Powered
BigMaster
Data Analytics
Platform on Azure
 Click to edit Master text styles

Get all services for Active 24x7 Endpoint
Monitoring & Response through global
Security Operations Centres (SOCs)
Second level
 Thirdidentification
level
 Signature-less
of advanced threats and unknown 
malware with
behavioral
 Fourth
level analysis

 Maximize endpoint
visibility
with in-depth physical memory
 Fifth
level
analysis
Availability & Uptime 
Configuration
Upgrades and
Updates

Provisioning

Technology refresh new features or
offerings

Monitoring

Problem Resolution


Security

processes/workflows
Ongoing Policy
Management
 Automatically reverse engineer all code in memory and
examine for malicious behaviors
 Validate externally fed indicators of compromise (IOCs) and
behavioral analytics techniques
 Rapid classification & prioritization of threats for optimal
incident response
6
STRICTLY PRIVATE & CONFIDENTIAL © 2015
Support for
incident
management
All these on 24x7 basis
Only
Zero
Overheads
ClickSecurity
to edit Outcomes,
Master title
style
You
pay only
forMaster
Securitytext
Outcomes
 Click
to edit
styles enabled by Deeper Detection, Faster
Response
andlevel
Always-on Service to protect against modern endpoint threats
 Second

Third level

Fourth level
 Fifth level
WITH NO OVERHEADS
 No hardware procurement and installation
 No software procurement and installation
Security
Investment
 No provisioning of users and functionalities
 No product administration and monitoring
 No technology refresh
 No process management
 No security skills
7
STRICTLY PRIVATE & CONFIDENTIAL © 2015
Click to edit Master title style
By engaging with us, our clients buy Security Outcomes, not just
 Click to edit Master
text
products
or styles
technologies:

Second level 

Third level

How
customers
benefit
Fourth level

 Fifth level
Achieve instant next generation security in simplified and affordable manner in a
few hours or days without waiting for several weeks or months and they only pay for
what they use without lock-in of initial capital expenditure
Stay protected against rapidly evolving threats with integrated threat intelligence
and 24x7 services for monitoring and management

Make the security technologies work for continuous protection through proper
management on an ongoing basis, role based policy changes and tracking of metrics

Overcome challenges of security skills and get unified security visibility and control
anytime they need across business lines, locations, users and assets without having
to integrate from many disparate technologies, and easily add new users or devices or
services with a single click

Get cyber security assurance from Paladion’s strength as a globally recognized
security specialist that has won industry recognition for its managed security delivery
STRICTLY PRIVATE & CONFIDENTIAL © 2015
Click to edit Master title style
 Click to edit Master text styles

Second level

Third level

Fourth level
 Fifth level
Thank You
Active Cyber Security, OnDemand
Because modern threats need a new model of security
STRICTLY PRIVATE & CONFIDENTIAL © 2015
9
STRICTLY PRIVATE & CONFIDENTIAL © 2015