3 / 10 Average Discovery Timeline For Attacks (2013) Stastistics for cyber espionage BREAKING NEWS iPhone 6 Clone to Hit the Market Before Apple's Smartphone «X» is famous for releasing very similar looking clones of flagship smartphones, and its clone handset portfolio already includes «X» M8 (clone of the HTC One M8), «X» S5 (clone of the Samsung Galaxy S5), and «X» i5S (clone of the iPhone 5s).
4 / 10 Data / Information Systems Networks / Communications Cyber Intelligence Data/Info mining Large volume data analysis Electronic intelligence Attack perception Backdoor scanning Decision support systems..... Services Processes Cyber security team PRO-ACTIVE Cyber Defense Situational awareness Mapping DDOS prevention BOT prevention SIEM Network sensors Log, data, flow analysis..... Services Processes Cyber defense team ACTIVE Complete Cyber Security Approach Level of situational awareness and security Data / Information Systems Networks / Communications IT Security Firewall Anti-virus Spam filtering Anti-spyware Content analysis IDS/IPS UTM Password mgmt PKI Encryption VPN NAT Backup/recovery..... Services Processes IT team PASSIVE
5 / 10 It is all about … Defense Systems (passive, active, proactive) People (admins, info analysts, reaction teams) Procedures (emergency, backup/recovery, …)
6 / 10 THALES Products Mistral Datacryptor ECHINOPS TCE 621 TEOPAD Cryptos & Mobile nShield connect nShield Solo nShield Edge HSMs THEMIS ELIPS Security GW Diodes and Gateways Sensing equipment CYBELS Map View Int - Decision Practice Cyber defense Sensors iStop ACTIVE AND PROACTIVEPASSIVE
8 / 10 Proven solutions Thales products currently protect systems for: 21 NATO member countries 19 of the 20 largest banks in the world 3,000 financial institutions worldwide Securing over 70% of the worldwide payment transactions 4 out of 5 top energy companies 4 out of 5 aerospace companies