fox-it · Fox DataDiode Prevent undesired access to secret information with this one-way network...

8
fox-it.com

Transcript of fox-it · Fox DataDiode Prevent undesired access to secret information with this one-way network...

  • fox-it.com

  • Being hacked can have enormous consequences. Stolen data can lead to financial loss, it can damage your reputation, and it can even force the board of directors to resign. An excellent cyber security strategy will protect your organisation and mitigate the risk of an incident. It will also help to limit the damage in the event that an incident does occur.

    Cyber security is about much more than just technology.

    Fox-IT believes that senior management staff needs to

    be aware of the business risks related to cyber security.

    This awareness – combined with insight into the current

    threat landscape – forms the basis of a well-integrated

    cyber security strategy. Such a strategy has both technical

    elements as well as human and organisational aspects. It

    means that organisations quite often have to make radical

    changes to the way they look at cyber security.

    Fox-IT supports public and private organisations in

    gaining a better insight. Insight into what is happening

    when a hack occurs, why it is happening, and how it

    can be prevented in the future. Fox-IT knows the digital

    threat landscape. We identify the risks that are relevant

    for your organisation. These risks are then addressed

    as part of an integrated strategy. We work closely with

    you to improve your lines of defence. We monitor your

    digital environment in order to detect potential breaches

    immediately. When an incident occurs, we make sure

    that your organisation is able to respond quickly and

    efficiently.

    Erik Ploegmakers Managing Director

    Fox-IT aims to stay the most reliable partner in cyber

    security. We offer a comprehensive range of advanced

    security services and security technologies. We’re able

    to help you draw up a cyber security strategy that’s right

    for your organisation. We work with you to identify the

    risks and to determine how to deal with threats; in other

    words: everything you need to prepare your organisation

    to face even the most advanced attacks.

    The most reliable partner in cyber security

    “ Cyber security is not just about technology.

    An excellent security strategy has human and

    organisational elements too.”

  • “ When it comes to cyber security, the Netherlands

    is more advanced than many other countries. Every

    day, however, hackers are thinking of new ways to

    break in. It’s crucial to keep on top of things.”

    Sanne Maasakkers Ethical hacker and trainer

    Consultancy & training for a more secure organisation

    An excellent security strategy is essential. Our step-by-step approach will allow you to constantly improve your cyber security strategy, both now and in the future. Fox-IT is here to help you develop, improve and implement this strategy. What makes us different? We have many years of extensive technological experience to draw on when giving advice.

    If you choose to work with Fox-IT you will find out more

    about our four-step approach:

    • Identifying your cyber security needs. What is

    at stake? Which threats and risks are relevant for your

    organisation?

    • Assessing your current cyber security. What is

    your current approach? Is it in line with the current

    threat landscape and the extent to which your

    organisation is exposed to risks?

    • Deciding on your security strategy. Fox-IT provides

    a summary of the findings and recommendations to

    manage your organisation’s security activities.

    • Implementing your cybersecurity strategy.

    We assist you in implementing and fine-tuning your

    security measures based on the step-by-step plan.

    Knowledge Transfer

    We will gradually share our expertise with your employees

    throughout this process. Some of our clients prefer to

    learn how to perform security tasks in-house. To achieve

    this goal, we offer a wide range of training programmes –

    from awareness-raising to crisis management and in-depth

    technical training courses.

    Practical training

    Our courses and training programmes are highly

    practical. Our trainers work in the field on a daily basis,

    and enjoy sharing information on the latest develop-

    ments and trends in cyber security. Why not take part

    in one of our training courses in Delft? Alternatively,

    you can ask Fox-IT to develop a tailor-made training

    programme to suit your needs. Would you like to

    organise a workshop, guest lecture or training course

    at a venue of your choice? No problem. Our aim is to

    achieve a more secure society.

  • Assets Resilience

    Espionage

    Crime

    Opportunism

    Con�dentiality

    Availabilty

    Integrity

    Prev

    entio

    n

    Response

    DetectionIntelligence

    Threats

    From personal data to intellectual property and from financial resources to continuity – every organisation has its own particular assets that are worth protecting. The crucial question, which at first glance seems simple, is this: what are the critical assets that your organisation needs to protect? And who might be interested in them?

    What makes your organisation an attractive target?

    The answer to this question forms the basis of a good

    cyber security strategy. Who is interested in gaining

    access to your data? Fox-IT will work closely with you

    to determine exactly what’s at stake, in terms of data,

    finance and continuity. Are there cyber espionage

    groups aiming for your organisation? How attractive

    are you for cyber criminals?

    As soon as we know which assets you would like to

    protect, we will provide a clear overview of the threats

    that present the biggest danger to your company.

    We then implement the appropriate cyber security

    measures. Our actions are based on the four aspects

    of our continuous improvement process for advanced

    cyber security:

    A comprehensive cyber security strategy

    • Intelligence – an insight into the threat

    landscape so you know which threats your

    organisation is facing.

    • Prevention – modern cyber security, comprising

    various layers and tuned to the threat landscape.

    • Detection – a warning system alerts you when

    attackers attempt to gain access.

    • Response – a process aimed at minimising

    the damage of an incident.

  • A comprehensive cyber security strategy

    Detection & Response

    Anti-fraud Management for

    Financials

    Detect real-time fraud on your

    bank’s various online channels.

    Incident Response

    Enjoy 24/7 professional support if

    a data leak or cyber attack occurs

    at your organisation.

    Managed Detection & Response

    Use the Security Operations

    Centre to have your organisation

    monitored 24/7. You will be notified

    immediately in the event of a

    potential incident.

    Threat Intelligence

    Intelligence for Financials

    Gain insight into external threats

    and risks so you can take preventive

    measures ahead of time.

    Managed Intelligence Service

    We can inform you of suspicious

    online activities, as well as leaked

    or stolen data found outside your

    organisation.

    How we protect your organisation

    Assessment

    Cloud Security Assessment

    Assess the security of your cloud

    services and suppliers. Find out

    which risks your organisation

    is facing.

    Cyber Security Assessment

    Determine the major cyber risks.

    Decide on the level of cyber security

    your organisation needs.

    M&A Cyber Due Diligence

    Establish the risks involved in a

    takeover, merger or disinvestment

    you are planning.

    Respons Readiness Assessment

    Bereid uw organisatie voor op

    een incident om zo tijd, energie

    en geld te besparen bij een echte

    cyberaanval.

    Technical Assessment

    Identify the technical vulnerabilities

    in your ICT infrastructure. Mitigate

    the risk of any incidents.

    Academy

    Awareness Programs

    Measure and structurally improve

    the awareness of the entire

    organisation. Create focus for

    topics that need attention.

    Exercises & Demonstrations

    Find out what happens during

    a hacking attempt. Practise the

    necessary skills with your team

    in a simulated incident.

    Open Courses

    Learn more about cyber security.

    We offer courses for beginners and

    advanced professionals.

    Training Programs

    Improve your teams’ knowledge

    and skills within the specific

    context of your own organisation.

    Testing

    Penetration Testing

    Find out more about the technical

    vulnerabilities in the complex

    relationship between your

    networks, systems and employees.

    Red Teaming

    Measure and improve the

    digital resilience of your

    entire organisation based on

    a realistically-simulated attack.

    Forensic Investigation

    Big Data Analysis

    Use eDiscovery software to

    investigate data in legal cases.

    Compromise Investigation

    Ask Fox-IT to investigate

    whether there has been

    unauthorised access to your

    network or information systems.

    Forensic Research

    Carry out a digital forensic

    investigation that can also be

    used as evidence in court.

    Litigation

    Enjoy the support of a legal

    expert during investigations.

    Crypto Technology

    ClientPortal™

    Use this platform to exchange digital

    files securely.

    Fox DataDiode

    Prevent undesired access to secret

    information with this one-way network

    connection. The Fox DataDiode is the

    world’s best-certified security product.

    OpenVPN-NL

    Download the hardened version of

    open source VPN technology for

    governments. The technology is freely

    available to everyone.

    SINA

    Allow for the secure processing, storage

    and transfer of secret information with

    these authorised security products.

    SkyTale™

    Secure networks with a high-security

    network encryption for the tactical

    and mobile domain.

    Consulting

    Security Coaching

    Take advantage of high-quality

    security knowledge and security

    expertise. Let Fox-IT coach your

    organisation on cyber security

    issues.

    Security Strategy & Roadmap

    Determine the required security

    level for your organisation. Ask

    Fox-IT to draw up a step-by-step

    plan to achieve this level.

  • CTM™, for 24/7 protection

    Criminals and spies are becoming smarter and more motivated. They make vast sums of money, which makes them increasingly better-equipped to confront your organisation with challenges. Relying on purely reactive protection is no longer enough; smart businesses opt for a proactive approach.

    Organisations are confronted with a range of challenges,

    including:

    • Threats that are constantly changing, becoming

    harder to detect and harder to prevent.

    • An incident not only means operational loss and lost

    profit, but also damage to your reputation and your

    client base.

    • New rules & regulations that add pressure when it

    comes to compliance

    A proactive approach

    If organisations are to successfully address cyber security

    risks, they must change their cyber security strategy from

    the traditional, protective and reactive approach to a

    more proactive approach. Analysts call this Managed

    Detection and Response (MDR). MDR is a comprehensive

    approach that brings together insights, technology and

    employees within an integrated range of services with a

    strong focus on response. Organisations must implement

    solid and reliable defence mechanisms and step away

    from fragmented and static solutions. They are no longer

    able to rely on technology alone to deal with these

    threats. Monitoring security and improving prevention

    and detection are more important now than ever before.

    CTM™ is Fox-IT’s MDR solution. CTM™ offers 24/7

    monitoring and detection from our European Security

    Operations Centre (SOC). Developed over the last two

    decades, this solution builds on the expertise of cyber

    security experts. Tried and tested, it is based on a

    combination of extensive insight into current threats

    and innovative technology, supported by a global

    network of security experts.

    ‘‘ Our 24/7 managed detection service detects cyber

    threats immediately. It helps organisations to

    efficiently respond if necessary. They’re protected

    night and day – even against the most advanced

    cyber threats.’’

    Christian Prickaerts Director Managed Services

  • Current affairs programmes often invite us because we

    are experts in cyber security. Following a data breach or

    hack, we discuss the potential causes and how it might

    have been carried out. Who was behind the attack?

    Although we enjoy sharing our profession, it may well

    give you a one-sided view of our organisation.

    Good news

    Information on cyber security incidents makes for a good

    news item, but in reality cyber security is about so much

    more than only responding to attacks. What’s more,

    the majority of our services and products are aimed at

    preventing and detecting incidents. So we’re not just

    experts on how to respond – our main focus is on incident

    prevention.

    At Fox-IT we work to improve our clients’ cyber security,

    and to create a more secure society. ‘Company X has

    taken all the necessary cyber security precautions and will

    no longer experience any incidents’ is not exactly headline

    news. However, this kind of news item would be great

    news for our society. If more companies were open about

    their cyber incidents, we would be able to learn from each

    other. Fortunately, there are companies taking the lead in

    this. Let’s follow their example.

    The side of cyber security that you never see in the news

    You’ve probably seen Fox-IT in the news. Cyber security is an important subject and we’re always keen to discuss it. However, the fact that we’re often asked to speak to news outlets means that our society is not yet as secure as we’d like it to be.

    “ Although it’s essential to know how to

    respond to a cyber security incident, we

    prefer to make sure that you never have

    to use that knowledge.”

    Erik de JongChief Research Officer

  • Fox-IT NCC Group

    A global network to fight cyber threats

    fox-it.com

    North AmericaCanadaOntarioToronto

    USAAtlantaAustinBoston

    CampbellChicagoNew YorkSan FranciscoSeattleSunnyvale

    EMEADenmarkCopenhagen

    DubaiDubai

    GermanyOttobrun

    LithuaniaVilnius

    The NetherlandsAmstelveenDelft

    SpainMadrid

    United KingdomCambridgeCheltenham

    EdinburghLeatherheadLeedsLondenManchesterMilton KeynesSlough

    Switzerland Zug

    APACSingaporeSingapore

    AustraliaSydney

    Fox-IT is onderdeel van NCC Group.

    Fox-IT B.V.

    Olof Palmestraat 6, Delft

    P.O. Box 638, 2600 AP Delft

    The Netherlands

    T +31 (0)15 284 7999

    F +31 (0)15 284 7990

    [email protected]

    About Fox-IT and NCC Group

    Fox-IT is part of NCC Group, a global expert on cyber security. NCC Group helps businesses to protect their organisation, brand, sensitive information and reputation in a world that is increasingly full of threats.

    The products and services of NCC Group not only protect organisations from around the world against cyber threats; they also provide them with peace of mind as their business continuity is safeguarded.

    In offices all over the world, over 2,000 NCC Group professionals protect more than 15,000 clients. The Fox-IT head office is located in Delft, the Netherlands, and the NCC Group is headquartered in Manchester in the United Kingdom.

    Our company history

    2001First SOC in Europe

    Fox-IT is the first company to launch a Security Operations Centre (SOC) in Europe.

    2006Threat Intelligence

    Fox-IT sets up the Threat Intelligence Research Centre aimed at financial

    institutions.

    2015NCC Group

    Fox-IT becomes part of the NCC Group in November 2015.

    1999FoundationFox-IT is founded as a consultancy firm for forensic expertise.

    2003Philips Crypto takeoverFox-IT takes over Philips Crypto technology to focus more on advanced cryptography for the government.

    2015CTM™Fox-IT launches CTMTM at RSA 2015.

    2019Cyber Strategy for DefenceDefence enters into a strategic partnership with Fox-IT to safeguard the development and availability of cryptographic products in the long term.