Cyber Security Competency Center

Similar documents
Microsoft Technologies

Cybersecurity and internal audit. August 15, 2014

IBM Connections Cloud Security

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Sygate Secure Enterprise and Alcatel

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

The Hillstone and Trend Micro Joint Solution

Privacy + Security + Integrity

PENETRATION TESTING GUIDE. 1

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Steven Shalita, Vice President, Marketing of NetScout Systems, Inc.

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

Where every interaction matters.

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

Cisco Advanced Services for Network Security

Safeguarding the cloud with IBM Dynamic Cloud Security

CONTENTS. PCI DSS Compliance Guide

The Protection Mission a constant endeavor

What Do You Mean My Cloud Data Isn t Secure?

Zone Labs Integrity Smarter Enterprise Security

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

End-to-End Infrastructure Solutions

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

Passing PCI Compliance How to Address the Application Security Mandates

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

Hands on, field experiences with BYOD. BYOD Seminar

Security Intelligence Services. Cybersecurity training.

OVERVIEW. Enterprise Security Solutions

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

FACING SECURITY CHALLENGES

IT Networking and Security

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems

The Next Generation of Security Leaders

Guardian365. Managed IT Support Services Suite

What to Look for When Evaluating Next-Generation Firewalls

Security in the Sauce Labs Cloud. Practices and protocols used in Sauce s infrastructure and Sauce Connect

Introduction to Cyber Security / Information Security

External Supplier Control Requirements

White Paper. Data Security. The Top Threat Facing Enterprises Today

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Address C-level Cybersecurity issues to enable and secure Digital transformation

I ve been breached! Now what?

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Windows Least Privilege Management and Beyond

A Decision Maker s Guide to Securing an IT Infrastructure

Remote Services. Managing Open Systems with Remote Services

Overview of F5 Networks. Fatih Bilger Senior Systems Engineer, Prolink.

IBM Internet Security Systems

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

Continuous, proactive cybersecurity.

Managing the Unpredictable Human Element of Cybersecurity

CYBER SECURITY, A GROWING CIO PRIORITY

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Design Your Security

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Security for NG9-1-1 SYSTEMS

Network Test Labs (NTL) Software Testing Services for igaming

Security Patch Management

12 Security Camera System Best Practices - Cyber Safe

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Security Policy JUNE 1, SalesNOW. Security Policy v v

SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES

Security Practices for Online Collaboration and Social Media

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Beyond the Hype: Advanced Persistent Threats

HEC Security & Compliance

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Security and Data Protection for Online Document Management Software

Symantec Mobile Security

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

How to complete the Secure Internet Site Declaration (SISD) form

Preemptive security solutions for healthcare

Web Security. Discovering, Analyzing and Mitigating Web Security Threats

IBM Security Strategy

CloudDesk - Security in the Cloud INFORMATION

How To Buy Nitro Security

Transcription:

Cyber Security Competency Center Overview February 2014 1

Overview As data and information have become intertwined with our daily life; they can be fairly regarded as the top asset of companies around the world. A study of 5000 organizations by research and advisory firm Corporate Executive Board (CEB) revealed that the ability to analyze and glean insights from data is a priority for global organizations. As much as data is constantly on rise, hackers find creative ways to attack organizations; businesses as well as governmental institutions. There are two main topics to be taken into account while defining a security strategy. One is data security, which means protecting the organization data assets from destructive forces and unwanted actions of unauthorized users, (ranging from hardwarebased security to backups or data masking), and the other is cyber security which consists of protection against hackers who go after the bigger fish : cause service shut down and create damage at all levels. However, things get a whole lot complicated, as attackers employ multivulnerability attack campaigns, which target the application infrastructure in several layers: the network layer, the application layer and the server layer. Running multiple attack vectors that aim for multiple vulnerabilities of the target IT infrastructure is highly destructive, while the business gets severely damaged. We have identified four vulnerable levels at which hackers favor their attacks: Mobile threat The mobile area is the most vulnerable zone, as it is less developed in terms of security. Moreover, we identify a double issue here, as besides the commercial damage we encounter the privacy issue (the hacker gets a hold on sensitive personal information) Cloud-commercial threat Cloud deployment model poses special challenges, these of the environment which is shared with multiple other applications and at the same time can potentially hold very sensitive data about the users. Usually, cloud vendors provide solutions for securing access to the data and the application, as well as solutions aimed against the cyber threats (such as DDoS insurance). Desktop threat This is a very vulnerable area and often an open gate to the organization data assets, highly exposed to social engineering attacks. We are aware that the challenge here is to provide access to the employees while also secure the access against outward threats. Data center threat As this is the core of the organization; most companies invest a lot in securing the data center, while leaving the gates of the other access points wide open. 2

Ignite Security Center of Excellence helps Vendors & Enterprises to create a cost balanced security plan optimizing technology, processes, applications and more. There is an urgent need for creative thought leading to the next generation of cyber security capability. Current approaches are simply not able to meet the demands of a global society growing in cyberspace. Success will necessarily require an ability to anticipate, deter, detect, resist and tolerate attacks, understand and predict cyber risks and respond and recover effectively at all levels, whether individual, enterprise, national or across international markets. Our Security Center of Excellence has been established to bring together experts from different areas, to address the cyber security challenges of the 21st century. It s a team who understands the attacks and knows the best strategies to prevent them. Threats Mobile Desktop Cloud Data Center Malware Identity theft Data Leaks Solution, Code Hardening Solution, Code Hardening N/A 2-way authentication, application Behavior-based access, application, auditing & logging DDoS N/A N/A DDoS Insurance, code hardening Cross-site Browser Browser scripting configuration configuration application attacks Man In The Middle Secure Protocols (SSL) N/A 2-way authentication, application Behavior-based access, application, auditing & logging DDoS insurance, code hardening application Secure Protocols (SSL) 3

Meet our Team Our Security competency center is led by a talented & experienced team of top notch professionals in the Cyber & Security arena. David Elkind Head of Security Competency Center David started his career as a hacker who was intellectually passionate to understand how to break software barriers and grew up in the security area working for leading companies like HP, BMC, Limelight Network, Aternity and more. His experience extends to various areas of expertise, starting with writing viruses, breaking applications and licenses, firewall developing, extensive experience in the kernel of Win and Linux. He has more than 20 years of industry experience and his proven track record of excellence recommends him as one of the most high profile professionals in his field. His ability to lead, inspire and coach people makes us proud to present David as the Head of our Security Competency Center. Aviram Eisenberg Technology & Business Strategist Aviram started his career in the IT arena during his army service at 8200, an elite intelligence unit. It is well known that high percentage of 8200 graduators serves in leading positions in the Israeli high-tech industry mainly in the security & cyber sectors. Prior to establishing Ignite, Aviram served as the Chief Architect for MIND CTI and provided solid leadership for the architecture group, the group that defines the Company s next generation solutions. He designed and managed software projects for strategic customers like Vodafone and Hutchison and managed on-going technical relationships with big companies as Oracle, Sun, IBM, HP and others. Aviram led countless projects at Ignite as an architect and true evangelist. He provided solid leadership for the architecture group, the group that defines the company s next generation solutions. His deep insight and intuition, led to a perfectly balanced optimization in terms of security which always proved perfect in meeting the business requirements. Aviram is the one introducing the perspective of a controlled security to fit in perfectly on a business level. As a strategist, Aviram always plans and thinks several steps ahead. His level of commitment and outstanding delivery, positions him in a league of his own. His insight and long standing experience proves him as an expert in assisting companies design more secured and better software applications. 4

Ed Gonen Network Security Expert Ed has developed the first windows firewall in Israel so he is a very prominent figure on the market and a highly experienced technology specialist. Moreover, Ed holds several technological patents which are registered in USA, mainly in the area of methodologies to handle and collaborating video and multimedia sessions over IP. As he holds 5 patents, Ed proves as a true visionary and a very valuable member of our team. Throughout his career, Ed has leveraged deep understanding of software and technologies to develop and release products to the commercial markets. He has defined strategic partnerships with main market players as Microsoft, IBM, Alcatel, WebEx and more. Ed has also developed the first Windows firewall in Israel for Net Guard. Moreover, he was responsible for definition architecture and development of the core assets such as Polycom Conferencing Application Server, Decision Matrix, device management, SIP, Network topology and many more. He was responsible for the intellectual property protection patents and applications. Ed is a man with true innovation and vision in the software industry. A gifted communicator, visionary and tactician, Ed certainly has it all. 5

How Ignite could help your business? What really sets us apart from the competitors on the market is our great expertise, prominent team and our unique approach towards delivering the perfect applications. We are proud to present the best solutions out there! Our offering includes consultancy in the following areas: Architecture design Audit on existing applications Vulnerability Analysis Code Review preparing the infrastructure environment by optimizing the use of system resources to meet key business demands. In order to develop architecture with excellent system qualities, we promote a structured thinking process, so that the correct decision can be made to select the best possible option. we collect and evaluate evidence to determine whether a computer system has been designed to maintain data integrity and safeguard assets, thus allow organizational security goals to be achieved effectively. To reduce the security risks posed by software vulnerabilities, we strive to address both the number of vulnerabilities in the software that is being developed, as well as the number of vulnerabilities in the software that is deployed. identifying the insecure piece of code which may cause a potential vulnerability in a later stage of the software development process, ultimately leading to an insecure application. This is a very important stage, as major part of attacks happen due to an insecure application, inside which includes insecure code. 6

About Ignite Ignite is a pure play Software Development Outsourcing company that provides a fresh, open approach to enterprise-scale software solution development for Independent Software Vendors worldwide. Ignite provides an agile global delivery model with Israeli, European and U.S. onsite personnel that bring their domain knowledge in the Telecom, Finance, E-Commerce, Social Networking, Gaming and Web 2.0 verticals in the front, and highly-skilled developers and testers in several Offshore Development Centers (ODC) in Eastern Europe. To learn more which model is best suited for you, contact us 7