HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight...

23

Transcript of HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight...

Page 1: HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.
Page 2: HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.

• HQ in Israel

• Threat research, security operations center 24/7.

• In-depth understanding and insight into how ‘cyber

crime’ works.

• Over 10 million online identities are already

protected.

Page 3: HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.

The risk outside the organization walls

Firewall

IPS

Anti Virus Employees

Customers

SSL VPN, Webmail..,

Online Services

Hacker

Page 4: HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.

The Risk

Page 5: HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.

Online fraud prevention focusing on Identity Protection and Transaction Integrity.

Completely clienteles while solving problems like MITB, MITM identifying infected end-user machines, Phishing attacks set-up (!), Pharming attacks – and all in REAL-TIME.

Bottom line: ZERO impact on user experience, MINIMAL implementation and very comprehensive fraud PROTECTION.

Versafe solution is implemented in various environments, such as eBanking, insurance, Gaming and ecommerce.

Page 6: HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.

Versafe Solution Architecture

OrganizationWeb Application

vTrack

vCrypt

vHTML

vCert

Versafe Cloud

vAlert System

vScanvDomain

vSpam

vTrojan

vSocial

vMonitor

vMobile

vPharming

vCrime

vSpy

vToken

vSOC

vTrack - Website Copy DetectionvCrypt - Applaication Layer EncryptionvHTML - HTML Modification Detection

vCert - Man In The Middle DetectionvToken - Automatic Malicious

Activity DetectionvMobile - Secure Web & Native

Mobile ApplicationvScan - Scanning For Similar

WebsitevDomain - Detection Similar

Domains

vSPAM - Spam Collection And Spam Analysis

vCrime - CyberCrime IntelligencevTrojan - Detection & Analysis & Forensics Trojan, C&C, DropZone,

Malicious Script, Configuration Files, Mule Accounts And Credential Recovery

vSocial - Monitoring Fraud In Social NetworksvMonitor - Monitoring Old FraudvSpy - Monitoring Hacker

Communities

vPharming - DNS hijacking Detection & MITM Intelligence

vSOC - Security Operation Center - Analysis & Takedown Fraud, Phishing, Trojan & Pharming

Page 7: HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.
Page 8: HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.

How long does it take to detect a Phishing site?

When did the phishing site go on the air? Who is the attacker? How many victims? Who are these victims?

Page 9: HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.

Faster response, shorter up times

Real time alerts Take down of fraud sites within four hours of detection Blacklisting on browsers Disinformation of the attacker Detection of affected users Collecting forensic information

Page 10: HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.

Versafe enables the immediate detection of a Phishing attack.

Versafe provides the organization with useful information: Instant detection of phishing site setup The attacker’s IP Number of victims that logged into the phony site Usernames and IP’s of victims Fast take down of the phishing site

Page 11: HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.
Page 12: HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.

Trojans – what needs to be asked

How can I neutralize end-users’ Trojans transparently?

Who are my infected users? What can I do once I found out a user is infected? How do I prevent a Trojan from stealing my customers

credentials? How can I protect the customers from automatic

transactions?

Page 13: HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.

Prevention, damage mitigation, identification of an infected PC

vCrypt - Encryption in the application layervHTML - Detect Malicious Code Injection in the client sidevHTML - Detect Infected ComputersAdvanced Virtual Keyboard (Anti key loggers, Anti screenshot and Anti click position)

vToken - Transaction & Authentication Integrity (Encryption, Verification and

Automation)

Page 14: HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.

Trojan Intelligence Automatic scanning & collecting for:

User Credentials in Trojan Drop Zones Dedicated Trojans Malicious Command & Control (C&C) Mule Accounts

Malware DNS/Servers Monitoring Information collecting from hacker communities Malware honeypots technologies Collect Partners Feeds

Page 15: HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.

Versafe neutralizes the effects of Trojans transparently

Versafe provides the organization with useful information: Infected users are reported to the organization There is no need for intervention by the user Advanced encryption disables Trojan functionality There is no need for compliance or cooperation by the

user

Page 16: HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.
Page 17: HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.

How many users connect to the organization over a tapped network connection?

Who are these users? Where have they logged in from? Who is the attacker? How do I prevent a “Pharmer” harvesting useful data?

Page 18: HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.

Versafe enables the organization to know of each user that logs in from an unsecure location, in real time.

Versafe provides the organization with useful information:

Identities of Pharming victims Location and IP of compromised router IP of the attacker Advanced encryption renders harvested data useless

Page 19: HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.
Page 20: HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.

Malware detectionMalware detection

Application level encryption

Application level encryption

Native Applications Components

Java for AndroidC Objective for iPhone

Web Application Components

Certificate checksCertificate checks

Virtual keyboardVirtual keyboard

Malware detectionMalware detection

Application level encryption

Application level encryption

Pharming detectionPharming detection

Virtual keyboardVirtual keyboard

Phishing detectionPhishing detection

Page 21: HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.

Versafe protects your customers & employees

Firewall

IPS

Anti VirusEmployees

Customers

SSL VPN, Webmail..,

Online Services

Hacker

Page 22: HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.

Enables organizations to become proactive, faster

Fast implementation on the organization’s websites

No installation of software on the end user side

Real time detection of identity theft

Supply the organization with critical information

Neutralize identity theft by Phishing, Trojans and Pharming

Page 23: HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.

E [email protected] T +972-3-9622655 #104

F +972-3-9511433