fox-it · Fox DataDiode Prevent undesired access to secret information with this one-way network...
Transcript of fox-it · Fox DataDiode Prevent undesired access to secret information with this one-way network...
-
fox-it.com
-
Being hacked can have enormous consequences. Stolen data can lead to financial loss, it can damage your reputation, and it can even force the board of directors to resign. An excellent cyber security strategy will protect your organisation and mitigate the risk of an incident. It will also help to limit the damage in the event that an incident does occur.
Cyber security is about much more than just technology.
Fox-IT believes that senior management staff needs to
be aware of the business risks related to cyber security.
This awareness – combined with insight into the current
threat landscape – forms the basis of a well-integrated
cyber security strategy. Such a strategy has both technical
elements as well as human and organisational aspects. It
means that organisations quite often have to make radical
changes to the way they look at cyber security.
Fox-IT supports public and private organisations in
gaining a better insight. Insight into what is happening
when a hack occurs, why it is happening, and how it
can be prevented in the future. Fox-IT knows the digital
threat landscape. We identify the risks that are relevant
for your organisation. These risks are then addressed
as part of an integrated strategy. We work closely with
you to improve your lines of defence. We monitor your
digital environment in order to detect potential breaches
immediately. When an incident occurs, we make sure
that your organisation is able to respond quickly and
efficiently.
Erik Ploegmakers Managing Director
Fox-IT aims to stay the most reliable partner in cyber
security. We offer a comprehensive range of advanced
security services and security technologies. We’re able
to help you draw up a cyber security strategy that’s right
for your organisation. We work with you to identify the
risks and to determine how to deal with threats; in other
words: everything you need to prepare your organisation
to face even the most advanced attacks.
The most reliable partner in cyber security
“ Cyber security is not just about technology.
An excellent security strategy has human and
organisational elements too.”
-
“ When it comes to cyber security, the Netherlands
is more advanced than many other countries. Every
day, however, hackers are thinking of new ways to
break in. It’s crucial to keep on top of things.”
Sanne Maasakkers Ethical hacker and trainer
Consultancy & training for a more secure organisation
An excellent security strategy is essential. Our step-by-step approach will allow you to constantly improve your cyber security strategy, both now and in the future. Fox-IT is here to help you develop, improve and implement this strategy. What makes us different? We have many years of extensive technological experience to draw on when giving advice.
If you choose to work with Fox-IT you will find out more
about our four-step approach:
• Identifying your cyber security needs. What is
at stake? Which threats and risks are relevant for your
organisation?
• Assessing your current cyber security. What is
your current approach? Is it in line with the current
threat landscape and the extent to which your
organisation is exposed to risks?
• Deciding on your security strategy. Fox-IT provides
a summary of the findings and recommendations to
manage your organisation’s security activities.
• Implementing your cybersecurity strategy.
We assist you in implementing and fine-tuning your
security measures based on the step-by-step plan.
Knowledge Transfer
We will gradually share our expertise with your employees
throughout this process. Some of our clients prefer to
learn how to perform security tasks in-house. To achieve
this goal, we offer a wide range of training programmes –
from awareness-raising to crisis management and in-depth
technical training courses.
Practical training
Our courses and training programmes are highly
practical. Our trainers work in the field on a daily basis,
and enjoy sharing information on the latest develop-
ments and trends in cyber security. Why not take part
in one of our training courses in Delft? Alternatively,
you can ask Fox-IT to develop a tailor-made training
programme to suit your needs. Would you like to
organise a workshop, guest lecture or training course
at a venue of your choice? No problem. Our aim is to
achieve a more secure society.
-
Assets Resilience
Espionage
Crime
Opportunism
Con�dentiality
Availabilty
Integrity
Prev
entio
n
Response
DetectionIntelligence
Threats
From personal data to intellectual property and from financial resources to continuity – every organisation has its own particular assets that are worth protecting. The crucial question, which at first glance seems simple, is this: what are the critical assets that your organisation needs to protect? And who might be interested in them?
What makes your organisation an attractive target?
The answer to this question forms the basis of a good
cyber security strategy. Who is interested in gaining
access to your data? Fox-IT will work closely with you
to determine exactly what’s at stake, in terms of data,
finance and continuity. Are there cyber espionage
groups aiming for your organisation? How attractive
are you for cyber criminals?
As soon as we know which assets you would like to
protect, we will provide a clear overview of the threats
that present the biggest danger to your company.
We then implement the appropriate cyber security
measures. Our actions are based on the four aspects
of our continuous improvement process for advanced
cyber security:
A comprehensive cyber security strategy
• Intelligence – an insight into the threat
landscape so you know which threats your
organisation is facing.
• Prevention – modern cyber security, comprising
various layers and tuned to the threat landscape.
• Detection – a warning system alerts you when
attackers attempt to gain access.
• Response – a process aimed at minimising
the damage of an incident.
-
A comprehensive cyber security strategy
Detection & Response
Anti-fraud Management for
Financials
Detect real-time fraud on your
bank’s various online channels.
Incident Response
Enjoy 24/7 professional support if
a data leak or cyber attack occurs
at your organisation.
Managed Detection & Response
Use the Security Operations
Centre to have your organisation
monitored 24/7. You will be notified
immediately in the event of a
potential incident.
Threat Intelligence
Intelligence for Financials
Gain insight into external threats
and risks so you can take preventive
measures ahead of time.
Managed Intelligence Service
We can inform you of suspicious
online activities, as well as leaked
or stolen data found outside your
organisation.
How we protect your organisation
Assessment
Cloud Security Assessment
Assess the security of your cloud
services and suppliers. Find out
which risks your organisation
is facing.
Cyber Security Assessment
Determine the major cyber risks.
Decide on the level of cyber security
your organisation needs.
M&A Cyber Due Diligence
Establish the risks involved in a
takeover, merger or disinvestment
you are planning.
Respons Readiness Assessment
Bereid uw organisatie voor op
een incident om zo tijd, energie
en geld te besparen bij een echte
cyberaanval.
Technical Assessment
Identify the technical vulnerabilities
in your ICT infrastructure. Mitigate
the risk of any incidents.
Academy
Awareness Programs
Measure and structurally improve
the awareness of the entire
organisation. Create focus for
topics that need attention.
Exercises & Demonstrations
Find out what happens during
a hacking attempt. Practise the
necessary skills with your team
in a simulated incident.
Open Courses
Learn more about cyber security.
We offer courses for beginners and
advanced professionals.
Training Programs
Improve your teams’ knowledge
and skills within the specific
context of your own organisation.
Testing
Penetration Testing
Find out more about the technical
vulnerabilities in the complex
relationship between your
networks, systems and employees.
Red Teaming
Measure and improve the
digital resilience of your
entire organisation based on
a realistically-simulated attack.
Forensic Investigation
Big Data Analysis
Use eDiscovery software to
investigate data in legal cases.
Compromise Investigation
Ask Fox-IT to investigate
whether there has been
unauthorised access to your
network or information systems.
Forensic Research
Carry out a digital forensic
investigation that can also be
used as evidence in court.
Litigation
Enjoy the support of a legal
expert during investigations.
Crypto Technology
ClientPortal™
Use this platform to exchange digital
files securely.
Fox DataDiode
Prevent undesired access to secret
information with this one-way network
connection. The Fox DataDiode is the
world’s best-certified security product.
OpenVPN-NL
Download the hardened version of
open source VPN technology for
governments. The technology is freely
available to everyone.
SINA
Allow for the secure processing, storage
and transfer of secret information with
these authorised security products.
SkyTale™
Secure networks with a high-security
network encryption for the tactical
and mobile domain.
Consulting
Security Coaching
Take advantage of high-quality
security knowledge and security
expertise. Let Fox-IT coach your
organisation on cyber security
issues.
Security Strategy & Roadmap
Determine the required security
level for your organisation. Ask
Fox-IT to draw up a step-by-step
plan to achieve this level.
-
CTM™, for 24/7 protection
Criminals and spies are becoming smarter and more motivated. They make vast sums of money, which makes them increasingly better-equipped to confront your organisation with challenges. Relying on purely reactive protection is no longer enough; smart businesses opt for a proactive approach.
Organisations are confronted with a range of challenges,
including:
• Threats that are constantly changing, becoming
harder to detect and harder to prevent.
• An incident not only means operational loss and lost
profit, but also damage to your reputation and your
client base.
• New rules & regulations that add pressure when it
comes to compliance
A proactive approach
If organisations are to successfully address cyber security
risks, they must change their cyber security strategy from
the traditional, protective and reactive approach to a
more proactive approach. Analysts call this Managed
Detection and Response (MDR). MDR is a comprehensive
approach that brings together insights, technology and
employees within an integrated range of services with a
strong focus on response. Organisations must implement
solid and reliable defence mechanisms and step away
from fragmented and static solutions. They are no longer
able to rely on technology alone to deal with these
threats. Monitoring security and improving prevention
and detection are more important now than ever before.
CTM™ is Fox-IT’s MDR solution. CTM™ offers 24/7
monitoring and detection from our European Security
Operations Centre (SOC). Developed over the last two
decades, this solution builds on the expertise of cyber
security experts. Tried and tested, it is based on a
combination of extensive insight into current threats
and innovative technology, supported by a global
network of security experts.
‘‘ Our 24/7 managed detection service detects cyber
threats immediately. It helps organisations to
efficiently respond if necessary. They’re protected
night and day – even against the most advanced
cyber threats.’’
Christian Prickaerts Director Managed Services
-
Current affairs programmes often invite us because we
are experts in cyber security. Following a data breach or
hack, we discuss the potential causes and how it might
have been carried out. Who was behind the attack?
Although we enjoy sharing our profession, it may well
give you a one-sided view of our organisation.
Good news
Information on cyber security incidents makes for a good
news item, but in reality cyber security is about so much
more than only responding to attacks. What’s more,
the majority of our services and products are aimed at
preventing and detecting incidents. So we’re not just
experts on how to respond – our main focus is on incident
prevention.
At Fox-IT we work to improve our clients’ cyber security,
and to create a more secure society. ‘Company X has
taken all the necessary cyber security precautions and will
no longer experience any incidents’ is not exactly headline
news. However, this kind of news item would be great
news for our society. If more companies were open about
their cyber incidents, we would be able to learn from each
other. Fortunately, there are companies taking the lead in
this. Let’s follow their example.
The side of cyber security that you never see in the news
You’ve probably seen Fox-IT in the news. Cyber security is an important subject and we’re always keen to discuss it. However, the fact that we’re often asked to speak to news outlets means that our society is not yet as secure as we’d like it to be.
“ Although it’s essential to know how to
respond to a cyber security incident, we
prefer to make sure that you never have
to use that knowledge.”
Erik de JongChief Research Officer
-
Fox-IT NCC Group
A global network to fight cyber threats
fox-it.com
North AmericaCanadaOntarioToronto
USAAtlantaAustinBoston
CampbellChicagoNew YorkSan FranciscoSeattleSunnyvale
EMEADenmarkCopenhagen
DubaiDubai
GermanyOttobrun
LithuaniaVilnius
The NetherlandsAmstelveenDelft
SpainMadrid
United KingdomCambridgeCheltenham
EdinburghLeatherheadLeedsLondenManchesterMilton KeynesSlough
Switzerland Zug
APACSingaporeSingapore
AustraliaSydney
Fox-IT is onderdeel van NCC Group.
Fox-IT B.V.
Olof Palmestraat 6, Delft
P.O. Box 638, 2600 AP Delft
The Netherlands
T +31 (0)15 284 7999
F +31 (0)15 284 7990
About Fox-IT and NCC Group
Fox-IT is part of NCC Group, a global expert on cyber security. NCC Group helps businesses to protect their organisation, brand, sensitive information and reputation in a world that is increasingly full of threats.
The products and services of NCC Group not only protect organisations from around the world against cyber threats; they also provide them with peace of mind as their business continuity is safeguarded.
In offices all over the world, over 2,000 NCC Group professionals protect more than 15,000 clients. The Fox-IT head office is located in Delft, the Netherlands, and the NCC Group is headquartered in Manchester in the United Kingdom.
Our company history
2001First SOC in Europe
Fox-IT is the first company to launch a Security Operations Centre (SOC) in Europe.
2006Threat Intelligence
Fox-IT sets up the Threat Intelligence Research Centre aimed at financial
institutions.
2015NCC Group
Fox-IT becomes part of the NCC Group in November 2015.
1999FoundationFox-IT is founded as a consultancy firm for forensic expertise.
2003Philips Crypto takeoverFox-IT takes over Philips Crypto technology to focus more on advanced cryptography for the government.
2015CTM™Fox-IT launches CTMTM at RSA 2015.
2019Cyber Strategy for DefenceDefence enters into a strategic partnership with Fox-IT to safeguard the development and availability of cryptographic products in the long term.