security intelligence continous it situation and intelligent

SECURITY INTELLIGENCE
CONTINOUS IT SITUATION
AND INTELLIGENT DETECTION
SELF-LEARNING
INTUITIVE
EASY INTEGRATION
THREAT LANDSCAPE IT SECURITY
ARE YOU PREPARED FOR PRESENT AND FUTURE THREATS?
INSUFFICIENT RESISTANCE
OF YOUR NETWORK
INCREASED NUMBER OF
INTELLIGENT ATTACKS: APTs
INCREASED INTERCONNECTIONS: INDUSTRIE 4.0
Vulnerabilities in networks are not
detected adequately and continuously. Furthermore networks are
not assessed as a whole.
Targeted, advanced and continuous
threats are challanges, that have
to be met by companies and their
existing security systems.
Missed or postponed updates as
well as outdated systems offer
targets for successful attacks.
The detection and protection of
such scenarios require much more
than classic protection functions are
capable of.
Industrie 4.0 means the global
connection of machines and production. Important success factors
are failure-free and efficiently
operating IT infrastructures. At the
same time threats get more professional and diverse. Successful attacks reduce the productivity, disclose
company secrets and jeopardize
the organization.
SECURITY INTELLIGENCE WITH SPOTUATION
The system is not static. It learns
the behavior of your network (Machine Learning). This abilty allows
the development of an reliable early
warning system. Your networks
resistance will be strengthened –
efficiently, measurable and promt.
Corporate
Network
spotuation is able to detect new
types of attacks based on their
communicational behavior.
The system is based on an innovative attacking and anomaly detection system. To uncover infection
attempts in time, covered channels
and manipulated connections are
detected by spotuation.
The use of the spotuation Security Intelligence within an Security
Operating Center (SOC) allows you
to detect unanticipated attack
patterns.
In combination with real time
monitoring you can achieve an
exceptional high level of detection.
This allows you to react as fast
as possible on cyberattacks (early
warning system).
spotuation
Web based
Security Intelligence
Classical
protection Systems
Threats
Inbound
traffic
spotuation keeps the whole network in sight. Thanks to continuous
situation mapping anomalies will
be recognized at an early stage
and weak points will be identified
immediate.
spotuation
Sensor *
Intrusion Prevention
next Generation FW
Outbound
traffic
Malware
Trojaner
C & C Server
Botnets
Continous situation mapping
Continous monitoring
Detection of vulnerabilities
Anomalie detection
Continous Threat
Detection
(incresing resistance)
(Machine Learning)
(Early Warning System)
* The sensor serves the passive analysis of the networks communication. For this purpose it is usually set up at the internet connection points.
Sensors are linked either to spotuation as a service or spotuation on premises.
SPOTUATION INCLUDES
THE FOLLOWING FUNCTIONS
IN DEPTH ANALYSIS
Forensics on operational or
security incidents
REPORTING: COMPREHENSIVE
COMMUNICATION SITUATION
COMPLIANCE
VERIFICATION
Status of network
Intelligent alerts
resistance
Notifications for detected hidden
Automated uncovering of
communication channels
vulnerabilities in systems
Notifications for policy violations
spotuation
spotuation
Network
Netzwerk
Intelligence
Intelligenz
Automated uncovering of
vulnerabilities in traffic
REALTIMEMONITORING
ADVANCED THREAT DETECTION
Automated uncovering of Advanced Persistent
Machine learning of network behavior
Threats (APTs)
Automated uncovering of traffic anomalies
Botnet detection and uncovering of command and
(Behaviour Analysis)
control traffic
Detection of infection attempts via manipulation of
connections
SPOTUATION OFFERS ADDITIONAL FEATURES
REFERENCE SYSTEM
Get the chance to compare several
REPUTATION SYSTEM
Valuation of several
THREAT INTELLIGENCE
All the information about attacks,
locations of your company based on
communication parameters regar-
control channels and patterns are
the communication parameters
ding safety and strength
collected in a central database.
Benchmarking of your own company with the particular business
sector
Early identification of possible
White- or blacklist the protocols
you want
This database is available for all
users.
Custumer specefic solutions for
your needs
threats when other companies get
attacked
YOUR BENEFITS
Complete transparency of the
networks communication
Protection against advanced forms
of attacks
Automated alerts for immediate
response
Recommendations for proactive
protection
Intuitive mapping of the state of
communication security
Enhanced network robustness
Detection of behavioral problems
(Signature Detection)
PICTURE OF YOUR
NETWORK SECURITY
Continous Data
Collection
(Sensor)
ROTECTIO
N
-P
TA
N
D
I
O
DA
UTZNSCH
DATE FORM
N
O
K
T
AT
A- P R O T E C
Intelligent
Intuitive
Data Evaluation
Visualization
(Core-System)
spotuation removes personal data
right before further processing.
This data can be use only in suspicious cases.
(Web-Portal)
E IN
AD
M
Y
MAN
GER
MA
DE
IN
spotuation was developed in Germany and matches the required
security standarts. With that we
want to ensure the trustworthiness.
THE RIGHT PACKAGE FOR YOUR NEEDS
SPOTUATION AS A SERVICE
SPOTUATION ON PREMISES
Simple integration
Data control and data security
Scalable
No extern connection
Cloud-connection
CONSULTATION AND TRAINING
ADDITIONAL SERVICES
All spotuation topics
Managed Security Services, 24x7 Monitoring
In-depth analysis
Security strategies
Response („Next Business Day“)
On-Site support
INTEGRATION
ORGANIZATIONAL
TECHNOLOGICAL
Information Security Management System (ISMS)
Security Information and Event Management (SIEM)
Security Operation Center (SOC)
Industrie 4.0 Solutions
Computer Emergency Response Team (CERT)
Weitere IoT Applications
TECHNICAL DATA
Sensor
Small
Medium
Large
Throughput
200 Mbit/s
2 Gbit/s
10 Gbit/s
Interfaces 10/100/1000 Mbit/ s
2
2
Interfaces 10 Gbit/s
-
–
2
Yes / Yes (1)
Yes / Yes (1)
– / Yes (1)
Core-System
saaS
soP Small
soP Medium
soP Large
Number of Sensors (max.)
Unlimited
5
20
50
Rack-Size
-
1
2
4
Full control of your own Data
-
Yes
Yes
Yes
Function selection
Modular
All
All
All
PC- / Rack- possibility
(Modul Size)
–
THE RESULT OF
INTENSIVE RESEARCH
spotuation arised from a contract research. The system was developed as a network
situation mapping technology, which was originally used for the protection of a public
authority‘s network infrastructure. Since then the technology is pushed forward in many
innovative ways. Today the system is used in many companies with lasting and measurable
success.
SEE MORE
THAN ATTACKERS EXPECT!
FINALLY SAFE IS A GERMAN TECHNOLOGY STARTUP
AND DEVELOPER OF SPOTUATION NETWORK INTELLIGENCE.
OUR AIM IS TO MAKE THE COMMUNICATION
WITHIN YOUR NETWORK VISIBLE. THIS GIVES CUSTOMERS
THE CHANCE TO ACHIEVE A HIGHER NETWORK RESISTANCE
AND TO DETECT ADVANCED FORMS OF ATTACKS MORE RAPID.
CONTACT
WE LOOK FORWARD
TO HEARING FROM YOU!
finally safe GmbH
Kurfürstenstr. 58
D-45138 Essen
+49 201 5454 1060
[email protected]
www.finally-safe.com