Presentation is loading. Please wait.

Presentation is loading. Please wait.

Www.accessdata.com Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)

Similar presentations


Presentation on theme: "Www.accessdata.com Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)"— Presentation transcript:

1 www.accessdata.com Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)

2 Who we are.. AccessData has been in this industry for over 25 years Offices in Utah, Houston, San Francisco, London, Virginia, Maryland, Frankfurt, Dubai, Australia and China Market leader/ Best of breed technologies in Forensics and eDiscovery 130,000+ Clients Globally Train over 6000 customers each year Sustained annual growth year after year of between 60% - 80% Gartner recognized as an Innovator in the space

3 AccessData Product & Services

4 Host-based Forensics Including Volatile Data Data Audit Paradigm Shift: An Integrated Platform Network Forensics Removable Media Monitoring Malware Threat Scoring & Analysis Integrated analysis in a single platform w/ built-in remediationCIRT Cyber Intelligence & Response Technology SSL Decryption

5 The Value of an Integrated Platform Integrated Platform DATA SPILLAGE Organization proactively performs audits using terms, such as “confidential” or “top secret”. All instances flagged for removal in accordance with policies. DATA SPILLAGE Organization proactively performs audits using terms, such as “confidential” or “top secret”. All instances flagged for removal in accordance with policies. VIRTUAL WORKFORCE VIRTUAL WORKFORCE Laptop checks in at intervals to be scanned for anomalies which are all recorded, including network and USB activity. Remote monitoring helps to identify any data theft or security breach. VIRTUAL WORKFORCE VIRTUAL WORKFORCE Laptop checks in at intervals to be scanned for anomalies which are all recorded, including network and USB activity. Remote monitoring helps to identify any data theft or security breach. INTRUSION ALERT Unauthorized port 443 traffic. Visualize communications, drill down into suspect host. Perform behavioral forensic analysis. Honeypot avoidance, crypto, dynamic loading, high entropy and other criteria indicate malware. Batch remediation function is leveraged. INTRUSION ALERT Unauthorized port 443 traffic. Visualize communications, drill down into suspect host. Perform behavioral forensic analysis. Honeypot avoidance, crypto, dynamic loading, high entropy and other criteria indicate malware. Batch remediation function is leveraged. CREDIT CARD INFORMATION REPORTED Help desk is called alerting them that employee discovered credit card information on an unsecure location. Company reactively conducts PCI audit to locate exposed credit card holder info. Instances are wiped. Findings are reported. CREDIT CARD INFORMATION REPORTED Help desk is called alerting them that employee discovered credit card information on an unsecure location. Company reactively conducts PCI audit to locate exposed credit card holder info. Instances are wiped. Findings are reported. ADVANCED MALWARE AND ZERO DAY DETECTION Proactive monitoring and the identification of malicious code behavior on multiple computers. Perform differential analysis of volatile data, perform malware analysis/ threat scoring. Analysis reveals malicious processes. Scan large enterprise for defined processes and/or similar behavior and issue batch remediation. Monitor for recurrence. ADVANCED MALWARE AND ZERO DAY DETECTION Proactive monitoring and the identification of malicious code behavior on multiple computers. Perform differential analysis of volatile data, perform malware analysis/ threat scoring. Analysis reveals malicious processes. Scan large enterprise for defined processes and/or similar behavior and issue batch remediation. Monitor for recurrence.

6 Multi-Team Collaboration for Improved Emergency Response Incident Response Team Information Assurance Team Network Security Team Compliance Team Computer Forensics Team

7 Introducing SSL Locksmith!!!

8 Encrypted Traffic is Exploding Encryption is an integral part of cloud computing and is used to secure e-commerce, Web 2.0 applications, email and VPNs SSL is the de-facto encryption standard SSL usage market data – SSL makes up more than 25% of traffic in most networks – 70% of traffic is encrypted in select verticals (health) – 52% CAGR in percentage of SSL-based WAN traffic A large number of enterprise and Internet- based Web 1.0/2.0-based applications use SSL – Microsoft Sharepoint, Salesforce.com, SAP, Oracle, WebEx, Windows Update, Google business applications (Gmail, docs, sites), Instant Messaging The increased amount of encrypted traffic in networks creates new threats and problems for network security Over 1 million SSL sites on the net

9 How does SSL Locksmith Work SSL Locksmith brokers SSL connections for its clients, by validating, and creating new internal certificates Clients must have SSL Locksmith Certification Authority certificate installed in order to broker SSL transactions

10 Perform Review of Encrypted Web Content


Download ppt "Www.accessdata.com Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)"

Similar presentations


Ads by Google