On Demand Penetration Testing Applications Networks Compliance. www.ivizsecurity.com

Similar documents
IT Security & Compliance. On Time. On Budget. On Demand.

Cisco Security Optimization Service

Integrated Threat & Security Management.

Clavister InSight TM. Protecting Values

Cisco Advanced Services for Network Security

PCI DSS Overview and Solutions. Anwar McEntee

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Securing the Service Desk in the Cloud

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

To ensure independence, PSC does not represent, resell or receive commissions from any third party hardware, software or solutions vendors.

Application Security Center overview

Preemptive security solutions for healthcare

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

PENTEST. Pentest Services. VoIP & Web.

Network Test Labs (NTL) Software Testing Services for igaming

Penetration Testing //Vulnerability Assessment //Remedy

Keeping your data yours

2011 Forrester Research, Inc. Reproduction Prohibited

Current IBAT Endorsed Services

Nine Steps to Smart Security for Small Businesses

How To Protect A Web Application From Attack From A Trusted Environment

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Vulnerability Management

Enterprise Security Solutions

Security. Security consulting and Integration: Definition and Deliverables. Introduction

PCI DSS. Payment Card Industry Data Security Standard.

PCI Compliance for Cloud Applications

G-Cloud IV Framework Service Definition Accenture Web Application Security Scanning as a Service

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Continuous Network Monitoring

Application Security in the Software Development Lifecycle

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

BMC s Security Strategy for ITSM in the SaaS Environment

GFI White Paper PCI-DSS compliance and GFI Software products

Department of Management Services. Request for Information

The Evolution of Application Monitoring

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

Kim Decarolis Compliance and Security Specialist (248) Mark Wayne Vice President Compliance and Security Specialist

locuz.com Professional Services Security Audit Services

RSA SecurID Two-factor Authentication

Security Controls What Works. Southside Virginia Community College: Security Awareness

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Cenzic Product Guide. Cloud, Mobile and Web Application Security

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Payment Card Industry Data Security Standard

Cutting the Cost of Application Security

McAfee Server Security

Security Testing for Web Applications and Network Resources. (Banking).

Avoiding the Top 5 Vulnerability Management Mistakes

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Assuring Application Security: Deploying Code that Keeps Data Safe

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Bringing Continuous Security to the Global Enterprise

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

DATA BREACH RISK INTELLIGENCE FOR HIGHER ED. Financial prioritization of data breach risk in the language of the C-suite

Overcoming PCI Compliance Challenges

The Value of Vulnerability Management*

IBM Rational AppScan: enhancing Web application security and regulatory compliance.

Testing Solutions to Tackle Application Security Checkpoint Technologies SQGNE. Jimmie Parson Checkpoint Technologies

F5 and Microsoft Exchange Security Solutions

HOW SECURE IS YOUR PAYMENT CARD DATA?

Security Services. 30 years of experience in IT business

Your world runs on applications. Secure them with Veracode.

Security Management. Keeping the IT Security Administrator Busy

Network Security and Vulnerability Assessment Solutions

Staying Ahead of the Hacker Curve Turn-key Web Application Security Solution

Goals. Understanding security testing

PCI Solution for Retail: Addressing Compliance and Security Best Practices

SAST, DAST and Vulnerability Assessments, = 4

Third-Party Access and Management Policy

PCI Compliance. Top 10 Questions & Answers

1 Introduction Product Description Strengths and Challenges Copyright... 5

Case 2:13-cv ES-JAD Document Filed 12/09/15 Page 1 of 116 PageID: Appendix A

Achieving Compliance with the PCI Data Security Standard

Professional Services Overview

What is Security Intelligence?

Devising a Server Protection Strategy with Trend Micro

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

PATCH MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Transcription:

On Demand Penetration Testing Applications Networks Compliance www.ivizsecurity.com

About iviz Security Information Security company with industry s first on-demand penetration testing solution using unique patent pending technology Funded by USD 4 Billion IDG Ventures (whose portfolio include Netscape and MySpace) Strong research team discovered new vulnerabilities in Microsoft, Intel, HP, Lenovo, McAfee, AVG and several others Customers from broad range of markets inlcuding media, telecom, financial services, Internet/web etc., Global recognitions by Intel, US Dept. of Homeland Security, London Business School, World Economic Forum

Why Security is a big concern today for businesses The Solution iviz On Demand Security Testing Solution About iviz

BUSINESSES ARE CONCERNED ABOUT SECURITY

Why Businesses Need Security? Business Continuity Manage Compliance Protect Brand Prevent business disruption by protecting critical IT assets Manage ever growing compliance requirements PCI, ISO-27001, SOX, HIPAA Ensure safety of your application and confidential customer data

Security Spending Is Increasing 13.1B 10.5B

Threat Landscape Is Increasing Too!

Security Breaches Are Increasing Even More!! 5863 Source: CERT-IN 2007

Even Secure Organizations Are Not Safe!

Security Challenges In Telecom Network Complexity: Heterogeneous non-integrated solutions make security landscape complex Network convergence & complexity makes security management challenging Open Infrastructure: Integration to VAS, Partners & Customer networks introduces new 3 rd party external vulnerabilities Emerging Technologies Threats: Recently introduced mobile payment technologies compound security exposure

Security Threats in Telecom Network Mobile Device Application Threats Wireless Link Threats Mobile Infrastructure Threats 3 rd party/ E- Commerce/Exte rnal Threats Mobile Network Internet Towers Mobile client Wireless Gateway Transaction Server Merchant

Attack Points in Telecom Pay Cycle Customer Merchant M-Commerce Server Customer Registers (Ph.#, PIN, Username, Password) Merchant Authenticates Customer (Transaction Details) Info Confirmation (Authentication Info & Payment/Merchant) MACD (Add charge to bill/prepaid a/c) Customer Charged (Phone Bill Deducted)

HOW TO ENSURE SECURITY?

How To Ensure That You Are Secure?..deeper penetration testing is now needed to augment existing vulnerability management processes, especially in light of the rising level of targeted attacks.

Challenges in Traditional Penetration Testing Not Comprehensive Manually finding all possible attack paths is not feasible Non-standardized and prone to human errors Low ROI Despite significant investments in penetration testing, infrequent test schedules makes it useless with very little ROI Time Intensive & Expensive Longer engagement process & turn around time Not-Scalable & Irregular Dependency on human experts Continuous IT footprint changes & new vulnerability discoveries makes it ineffective

Challenge: Multi-Stage Attacks Are Hard To Detect.. exploit multiple security weaknesses that individually are not critical, but in the aggregate, they allow an attacker to compromise business critical data

Challenge: Non-Critical Vulnerabilities Are More Harmful! Critical Server Non-Critical Server Harmless Critical Vulnerabilities Harmful Non-Critical Vulnerabilities

THE SOLUTION

The Solution iviz On Demand Security Testing Solution Applications Networks Compliance Comprehensive Cost-Effective On Demand

iviz Technology Solves The Problem Technology to Simulate/Emulate Community of Mutually Co-operative Self Replicating Intelligent Human Hacker

iviz Attack Simulation Technology Detects all multi-stage attack paths!

iviz On Demand Solution On Demand Application Penetration Testing Covers all OWASP web application vulnerabilities Expert Validation along with automated scanning Business logic verification Threat Modeling On Demand Network Penetration Testing Comprehensive vulnerability coverage including data-inmotion leakages Detection of attack paths missed by even in traditional testing Appliance deployed within your network for internal testing Expert validation along with automated exploitation On Demand Compliance Reporting PCI ISO 27001 SOX HIPAA

Security Solution For Telecom Wireless (WLAN) penetration Test Cellular Technology Security Test WID Testing Mobile Service provider User Application Application Penetration Testing Fraud Management Testing Mobile Portal Provider Content Aggregation Web services security Testing Functional Security Testing Content Developer Personalization Support Source Code Review Application Integration Testing Mobile App Vulnerability Test Application Developer Presentation Service Product Security Testing Black Box Penetration Test Security Policy Audit Application Platform Vendor Transaction Support Infrastructure and Equipment Vendor Basic Enabling Service Technology Platform Vendor Transport

iviz Solution Benefits On Demand Comprehensive Cost-Effective Flexible scheduling using secure on-demand portal Access to reports online or by encrypted email On-line vulnerability management dashboard Detection of attack paths otherwise missed out in traditional testing Elimination of false positives & prioritization of real threats Access to zero-day vulnerability research Monthly / Quarterly Subscription Low cost of ownership Higher ROI & continuous security

On-Demand Penetration Test: How It Works? LOG ON TO ONLINE PORTAL SCHEDULE TEST FROM ONLINE PORTAL TEST CONDUCTED AUTOMATICALLY VIEW REPORTS ONLINE OR BY ENCRYPTED EMAIL iviz Remote Security Operation Center Customer Network On-Demand Portal Internet Secure iviz Scan Cluster

On-Demand Portal Regular Scan Schedule

On-Demand Portal Dashboard

On-Demand Portal - Reports

CASE STUDIES

Case Study Customer: Indian Telecom Major Problem: Launching a new mobile payment service Security threats of mobile payment service iviz Solution: Conducted in-depth penetration testing of the mobile payment system & its deployment Results: Detected security gaps & helped fix them Validation retesting to ensure fixes closed the gaps

Case Study Customer: Indian Telecom Major Problem: Integrating a new solution of VAS vendor Security of the solution & integration iviz Solution: Conducted in-depth penetration testing of the application, integration points & infrastructure Results: Detected security gaps & helped fix them. Post fix validation done to ensure gap closure Next step is to test more than 200 other applications

Case Study Customer: Global Telecom Major Problem: Security challenges on their corporate website iviz Solution: In-depth penetration testing of the application & the website Results: Detected security gaps in the online portal & helped fix them. Post fix validation done to ensure gap closure Regular test to be conducted to ensure continuous security

Case Study Customer: Revenue Assurance (RA) Solution Company Problem: Security of their solution needed to be tested before their telecom customer can integrate with them Solution: iviz in-depth penetration testing of the solution & the integration points with the telecom network Results: Detected vulnerabilities & helped remediate them On-going security testing to guarantee security to their customers

Why They Chose iviz iviz unique technology Comprehensive attack simulation Globally recognized technology Expertise Research team which discovered vulnerabilities in global products On Demand Anytime, Anywhere Scalable Fast iviz technology can match the large scale requirements in terms of tests & frequency Faster than traditional solutions

ABOUT IVIZ THE COMPANY BEHIND ON DEMAND SECURITY TESTING

Global Recognitions For Technology Top 4 Emerging Product Company (2008) Top 100 in Asia (2008) 10 Hottest start-ups (2008) World Economic Forum Technology Pioneers Nomination (2008) Top 2 in Asia (2007) Top 6 in World (2007) Top 8 in the world (2006) Top 2 in India (2006)

One Step ahead of hackers: iviz discoveries iviz Vulnerability Research Team has consistently discovered numerous security vulnerabilities for the first time in the world Discovered multiple vulnerabilities in the hard disk encryption products Discovered multiple vulnerabilities in the BIOS of products Discovered multiple vulnerabilities in Antivirus products

iviz Research Widely Covered By Global Media Encrypting hard disk is not safe. New vulnerability discovered by iviz affects Microsoft, Intel, HP and Others New vulnerability discovered by iviz affects Microsoft, Intel, HP and Others 10 Hottest Start-ups IDG Ventures invests $ 2.5 Mil to Enable iviz Expand Operations iviz Solutions Aim to Put Hackers Out of Work Keeping a digital vigil

Customers Across Broad Industries Media/Internet Telecom Financial Services Government Technology / Others

Thanks Bala Girisaballa Vice President, Head of Products & Marketing bala.girisaballa@ivizsecurity.com On Demand Penetration Testing Applications Networks Compliance www.ivizsecurity.com