Continuous, proactive cybersecurity. Your own RoboHacker, that Continuously generates Simulated Penetration Attacks, 24/7, by imitating the Behavior of a Human Hacker, thus preventing the attacks before they can occur.
Cybersecurity Challenge Vulnerabilities are created continuously (24/7) B U T companies normally run Penetration Tests to find them only once in a while and remain exposed most of the time Hackers can find vulnerabilities and break into company networks D E S P I T E sophisticated firewalls and anti-virus systems. Companies invest a fortune on Cybersecurity solutions B U T don t really know if they are properly protected. Companies tend to have a reactive attitude against attacks, NOT AT ALL proactive, as it should be. On average, it takes more than 200 days for companies to detect that they have been hacked. Penetration Tests are effective B U T are done manually by ethical hackers, are very costly, and create a heavy load on company networks. Plus, they are also not very thorough. Source: EY s Global Information Security Survey 2014
CyBot Pro Differentiators and benefits Secures computer systems 24/7 with automated Penetration Tests on the entire IP based system, including: Cloud, ERP, WiFi, Cellular, WEB, Switches, Storage, AS-400, VoIP and Servers. Implements automatically the full cycle of penetration testing: scanning the network (both infrastructure and web applications), collecting vulnerabilities (known, but also newly discovered, darkweb ones), constructing possible attack scenarios (as a human hacker would do, including twosteps/multiple steps attacks), testing the scenarios (and thus avoiding the false positives) and returning results for immediate preventive action. Provides recommendations for immediate fixes of vulnerabilities, and M2M instructions enabling security equipment to block intruders. Provides BI Security with a tool to check the exposure of an organization under various parameters, over time. Allows the design of efficient, effective & sophisticated protection of enterprise resources. Enables IT Security Managers to deal with vulnerabilities immediately and more effectively.
CyBot Pro Area of coverage CyBot Pro can address and prevent different types of Cyber Attacks such as: Penetration of critical infrastructure (e.g., IBM z/os, AS-400) or servers that are hosted in the cloud, such as: AWS (Amazon) Routers vulnerabilities that can lead to DoS (Denial of Service) attacks Penetration of mail servers through Cellular Phones Penetration through cameras, controllers, time clocks and Smart TVs Injection of hostile code to websites Unauthorized access to any ERP system, such as: SAP, Oracle, etc. Access to file systems with critical information, such as: credit card information, passwords, patents and contracts Call fraud in VoIP systems (e.g., stealing calls) Injection of Trojan code on company s servers
CyBot Pro System Architecture 1. Continuous vulnerability scanning 2. Immediate identification of a Cyber event scenario 3. Blocking and warning in real time Patented Patent 1 Patented Patent 2 Cooperation Unique algorithms which allow CyBot Pro to function as an Automated Ethical Hacker. Industry s fastest detection system that seamlessly protects all IP devices. Patented testing method, minimizing network load and avoiding any critical interference with the regular operations.
CyBot Pro Identification of a Cyber event scenario 1. Establish possible hacking goals 2. Define and test scenarios Scenario 1 Win 7 vulnerability that enablestheft of the Authentication Information Scenario 2 Printer vulnerabilitythat enablestheft of the Authentication Information servers storage backbone Penetrate the Domain Controller Penetrate the Domain Controller Scenario 3 Switch vulnerabilitythat enabletheft of the SSH Information Penetrate FireWall
CyBot Pro Findings and recommendations 7
CyBot Pro Sample Scan Analysis Detailed dashboard for current vulnerabilities and drill-down to specific problems, their origin and how to deal with them.
CyBot Pro Sample Scan Analysis Intuitive menu for very easy definition & schedule of scans and review scan high level results.
CyBot Enterprise Centralized control over the network Unified GUI and collaborative control room for all Cybot Pro installments deployed.
CyBot Enterprise network s risks snapshot Graphic overview of the network and precise multilevel, multi-location attack paths alerts.
Founders: Cronus About CyBot Pro s developer Branched-out of Madsec, a leading Israeli company in the field of information security, risk assessment and penetration testing, since 1995 Doron Sivan CEO & Co-Founder. (BS in Physics/ MBA) Information security expert and a Government advisor in Israel. Author of several books used for instructing the cyber intelligence units of the Israel Defence Forces (IDF). Physicist by education with extensive experience in analysing scenarios of cyber attacks on critical systems. Lectures in the army at the prestigious 8200 Intelligence Unit. Provides risk assessment services to financial institutions and global organizations. Matan Azugi CTO & Co-Founder. Ethical Hacker & Attack scenarios expert. Extensive experience in penetration testing for large organizations in Israel and Europe. Developed tools to identify attacks on: cloud, cellular, SAP, storage and critical services. Cronus skills and area of expertise include: Experienced development team, specialized in analyzing network & application vulnerabilities and creation & deployment of attack scenarios. Cyber labs specialized in analyzing the Dark-net and performing characterization of vulnerabilities, based on market and client needs.
CyBot Pro Deployment cases Haifa University is one of the biggest Universities in Israel. Its IT network includes 880 servers and 5,000 PCs and needs to maintain complex and dynamic systems, such as: SAP, hundreds of web servers, and thousands of Virtual Machines CyBot Pro provides the ability to be aware, in real time, of all the potentially dangerous scenarios affecting the network and to be one step ahead of the hackers. NILIT is a global company, which offers a range of products for the thermoplastics industry. The company operates in 70 countries. Their IT system needs to maintain the highest level of security CyBot Pro enables NILIT to scan its networks on a daily basis, in all countries, and to be informed immediately of the vulnerabilities that might lead to a cyber attack. Nahariya Galilee Medical Center is the largest government-run hospital in the Galilee region of Israel. As a government-run hospital, it s linked to other hospitals in the network, allowing the transfer of information about patients between hospitals CyBot Pro immediately notifies about any vulnerabilities that can lead to the leakage of confidential information.
Cyberwatch your security. Contact: sales@go2markets.eu