RUAG Cyber Security. More security for your data



Similar documents
Prepared for tomorrow s challenges with your global full service partner

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Cyber Security Evolved

HNOLOGY IN POLICING SECURITY & CYBERSPACE SITUATION

Audit summary of Security of Infrastructure Control Systems for Water and Transport

Advanced Threat Protection with Dell SecureWorks Security Services

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Cyber Security for SCADA/ICS Networks

Compliance Guide: ASD ISM OVERVIEW

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber security Building confidence in your digital future

Cyber Security Strategy

CYBER SECURITY Audit, Test & Compliance

How To Manage Risk On A Scada System

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

How To Create An Insight Analysis For Cyber Security

Business Plan 2012/13

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS

How To Protect Your It Infrastructure

The Geospatial Approach to Cybersecurity: An Executive Overview. An Esri White Paper January 2014

You Can t Afford the Risks

THE HUMAN COMPONENT OF CYBER SECURITY

The Cyber Threat Profiler

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk

SPEAR PHISHING UNDERSTANDING THE THREAT

Physical Security Services

Cybernetic Global Intelligence. Service Information Package

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Developing a robust cyber security governance framework 16 April 2015

CyberSecurity Solutions. Delivering

Delivering peace of mind in outsourcing

Secure by design: taking a strategic approach to cybersecurity

CYBER SECURITY, A GROWING CIO PRIORITY

Cybersecurity Delivering Confidence in the Cyber Domain

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

developing your potential Cyber Security Training

Isle of Man Government

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing

Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au

KUDELSKI SECURITY DEFENSE.

BT Assure Threat Intelligence

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

A NEW APPROACH TO CYBER SECURITY

MANAGED SECURITY SERVICES (MSS)

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

White Paper. Information Security -- Network Assessment

Into the cybersecurity breach

Mitigating and managing cyber risk: ten issues to consider

A strategic approach to fraud

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

Aon Risk Solutions Aon Crisis Management. Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

integrating cutting-edge security technologies the case for SIEM & PAM

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

CYBER SECURITY TRAINING SAFE AND SECURE

Surveillance and Security Systems

We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Information Technology

Information Security Services

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

Recognize the many faces of fraud

Address C-level Cybersecurity issues to enable and secure Digital transformation

2015 Information Security Awareness Catalogue

NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security

Market Data + Services. Advanced outsourcing solutions. IT Hosting and Managed Services

Cyber Security solutions

London 2012 Olympic Safety and Security Strategic Risk. Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments

Protecting your business interests through intelligent IT security services, consultancy and training

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

The Comprehensive National Cybersecurity Initiative

Navigating Cyber Risk Exposure and Insurance. Stephen Wares EMEA Cyber Risk Practice Leader Marsh

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

Data analytics Delivering intelligence in the moment

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Transcription:

RUAG Cyber Security More security for your data

More security in cyberspace The RUAG Cyber Security Portfolio offers greater protection for your data through inspection, event analysis and decision-making support. Tailored to your requirements. We live in a globally networked information and communication society. This presents numerous opportunities as well as huge risks. Protection from cyber threats is a very important and wide-ranging issue. Cyber attacks over networks, manipulation, espionage and cyber terrorism are issues that are increasingly making headlines. The aim of cyber criminals is to gain access to confidential data, to compromise data integrity and the correct functioning of network infrastructures, as well as to limit, disrupt or even block their availability. The rapid pace at which attacks are developing and the various forms they take pose a significant challenge when it comes to predicting and countering cyber threats. Cyber attacks can harm your company s reputation The security of data and ICT infrastructure has been a critical success factor for some time now. Cyber security has become an issue for top management and is considered a matter of the highest priority. This is because they know that once confidence in the security and availability of ICT systems has been lost, it has far-reaching impact on the reputation and the value of the organisation. Top management deals with the issue of cyber security as a matter of the highest priority. Is it your top priority too?

Asymmetric threat situations The world of cyber crime is asymmetric, as attacks involve the use of cutting-edge methods and technologies to find and exploit weak points, while defending parties have to constantly adapt their security setup and cannot afford to allow a single gap to emerge. Furthermore, cyber weapons today are easily accessible and proliferated. Perpetrators include lone wolves seeking recognition, political activists, criminal organisations attempting to commit fraud or blackmail, as well as government-sponsored cyber espionage or ideologically motivated terrorists. They tend to aim at damaging and destabilising the security and infrastructure of the country, economy and society at least temporarily. Who is particularly at risk? Companies and organisations with high security requirements, in particular, depend on having an efficient and proactive security setup to effectively counter cyber attacks: Telecommunications companies and Government authorities and organisations Internet service providers that perform security-related duties Energy companies (emergency services) Transport companies Armed Forces Financial services providers Trading companies There is not just ONE security solution. Effectively countering cyber attacks requires a basic understanding of the current situation and possible developments (situational awareness). It is critical that your company can quickly recognise a threat, adapt to the situation and predict future threats as accurately as possible. To ensure that countries, businesses and society can defend themselves against cyber-threats, they must understand their network environment at all times. Or, better still, be able to anticipate threats and create an effective cyber-threat forecast.

RUAG Cyber Security Portfolio Every organisation has specific security requirements, which is why cyber security solutions must always be adaptable and easily adjusted to customers cyber defence needs. The RUAG Cyber Security Portfolio consists of services and solutions to protect your infrastructure and analyse incidents in cyberspace. The RUAG Traffic Analyzer Workbench is a specialised solution which detects and counters cyber threats. Its fully integrated components include the RUAG Traffic Sensor, RUAG Traffic Monitor and RUAG Traffic Visualizer. The modular structure of the RUAG Traffic Analyzer Workbench ensures the simple integration of third-party components. RUAG also works in collaboration with leading international partners to offer security solutions such as SCADA systems (supervisory control and data acquisition). The diverse range of available services supports you in designing, planning and implementing your individual security solution. It provides clear benefits in the areas of strategy development, auditing, security design, integration, simulation and training in a realistic ICT environment. What makes the RUAG Cyber Security Portfolio unique? Detecting and eliminating unwanted network traffic quickly and in good time requires leading-edge technologies and solutions. The forecast offered by the RUAG Cyber Security Portfolio allows customers to accurately identify likely future threats by extrapolating large data sets. This one-of-a-kind feature is the result of RUAG s research into cyber security. The experts in the research units have many years of experience in Cyber Security solutions for the military, government authorities and businesses. They share experience and expertise with leading forensics experts, universities and cyber security professionals around the world.

Services RUAG Cyber Security Management Information System Protection Secure ICT Architecture Simulation/ Security Check Validation Security Strategies and Concepts Cyber Security Training Research RUAG Traffic Sensor RUAG Traffic Monitor Forecast & Decision Support RUAG Traffic Visualizer RUAG Cyber Security Management Information System RUAG Traffic Analyzer Workbench Solutions and Components Validation Protection Research RUAG Cyber Security Research creates the foundation for solutions based on state-of-the-art knowledge and development. Global cooperation with forensic experts, universities, governments and people in the cyber security industry Research unit with many years of experience in cyber security solutions for the military, government authorities and businesses. Security Strategies and Concepts Blueprint for the targeted protection of the ICT infrastructure and process control technology (PCT). Guidance for security strategies with support for design and implementation Information security and data protection: transport, storage and processing of information on secure ICT infrastructures Secure ICT Architecture Client-specific, robust and reliable security solutions Implementation of security in the existing ICT infrastructure Maintain capabilities design, implementation and monitoring of improved security solutions Simulation and Security Check Monitors continuously and closely the security set-up Rapid identification of weak points or gaps and how to fix them Simulation of cyber attacks Cyber Security Training In cyber security training IT specialists, employees and management staff are trained in how to respond to all types of cyber emergencies The training includes automatic and recurring cyber attacks in a realistic environment It makes it possible to train for procedures in a real situation and prevent emergencies from occurring by raising awareness RUAG Traffic Analyser Workbench RUAG Traffic Sensor The RUAG Traffic Sensor analyzes the network traffic data and enriches it with information. Forms the basis of the solutions from the RUAG Traffic Analyzer Workbench Can be used by specialists for many types of complex analyses RUAG Traffic Monitor The RUAG Traffic Monitor offers a flexible solution for analyzing network traffic. Alerts and reports, consistent with the threat situation Provides robust rules for analysis, which can be expanded with client-specific requirements RUAG Traffic Visualizer The RUAG Traffic Visualizer is a graphical interface for forensic analyses, no matter how large the data traffic is. The immediate display of partial results allows for more rapid and exact analysis results The analysis results can be used as rules in the RUAG Traffic Monitor RUAG Cyber Security Management Information System* Central communication platform for management decision support Visualizes threats and quickly recognizes the connections Makes it possible to introduce targeted measures * Under development

Strong defence against cyber attacks Predicting and visualising unusual and suspicious network traffic is the key to defending against previously unseen incidents in an effective and timely manner. With the RUAG Cyber Security Portfolio, you can analyse and evaluate your network traffic as well as detect and address suspicious network connections at an early stage.

Your benefit at management level Protection of your company s/organisation s reputation and value thanks to enhanced security awareness and proactive risk management Protection of the company s values (corporate security) thanks to increased security and availability of data Improved compliance with regulatory demands with regard to regulations and assessment of the overall risk situation Lean and efficient management process in the event of security incidents Your benefit at operational level The system can be easily adapted to your specific environment by creating and applying your own rules Numerous available plug-ins and rules to detect security problems, which are regularly updated to meet the latest requirements Faster and targeted response to cyber attacks Your benefit at analytical level Use of complex preconfigured algorithms to analyse network anomalies in a faster and simpler manner A wide range of tools to visualise your network traffic in order to support your analysts. There is no limit to the amount of data sets that can be visualised. Import and export functionalities for data sets from a wide range of sources mean you can learn from the patterns of cyber attacks identified by others or forward suspicious network data to RUAG s cyber experts for comprehensive analysis Mathematical models for determining the likelihood of events (forecast) The comprehensive RUAG Cyber Security Portfolio meets the requirements of a proactive, flexible and effective cyber security system. It ensures compliance with the most stringent security standards with regard to handling of your data and network infrastructures.

03.15 Security is based on trust. RUAG Defence offers world-leading services and products for the defence and security industry, including reconnaissance, communication and management systems as well as virtual and live simulators. RUAG s experts have many years of experience in cyber security solutions for the military, government authorities and businesses. The combined use of both civil and military technology opens up opportunities for both customer segments. RUAG s in-house research activities ensure groundbreaking innovation and unique know-how. As a Swiss company, we embody the typical Swiss values of independence, reliability, security and stability. RUAG is an international technology group operating in the fields of aerospace and defence. Its holding company is located in Berne, Switzerland. RUAG has production sites in Switzerland, Germany, Sweden, France, Austria, Hungary, Australia and the USA. The company employs some 8,200 people worldwide, including 414 trainees in 23 different occupations. RUAG Schweiz AG RUAG Defence Allmendstrasse 86 3602 Thun Switzerland Phone +41 33 228 22 65 Fax +41 33 228 47 83 marketing.defence@ruag.com Visit our Website cyber.ruag.com