Open Source Intelligence Overview

11
1 We provide the cyber intelligence that keeps blue chip companies from turning red Cyber Intelligence Overview

description

Proactively Monitoring the Open Source Internet for High Impact Threats

Transcript of Open Source Intelligence Overview

Page 1: Open Source Intelligence Overview

1

We provide the cyber intelligence that keepsblue chip companies fromturning red

Cyber Intelligence Overview

Page 2: Open Source Intelligence Overview

2© 2009 Cyveillance, Inc. www.cyveillance.com

Rapidly Increasing Impact of Online Threats

HackersViruses

Worms

Spam

Customer Diversion

Counterfeiting

Information Leaks

ID Theft

Phishing

Security Risks

Malware

Internet Adoption

Fin

anci

al

Imp

act

Attacks Your EnterpriseAttacks Your Enterprise Attacks Your BusinessAttacks Your Business

Economic Impact:• Decreased revenues• Lost customer trust• Increased fraud expense• Damaged reputation• Increased support costs

Economic Impact:• Decreased revenues• Lost customer trust• Increased fraud expense• Damaged reputation• Increased support costs

Page 3: Open Source Intelligence Overview

3© 2009 Cyveillance, Inc. www.cyveillance.com

Customer Challenges

"There's no way my folks, even given the time to scour the Internet, could have found the anti-nuclear

activists targeting one of our facilities, or the IP being leaked to the Internet by former employees.”- Director Enterprise Security of Fortune 100 Energy Company

“We are aware that animal rights groups are using the Internet to target our senior executives and their

family members.”- Director of Security, Fortune 100 Pharmaceutical Company

“While we have several effective internal systems in place to identify fraud, we know that credit card

numbers and related data are being sold and traded on the Internet”- Director, Loss Prevention of Large Brand Retailer

“We knew we were losing millions in revenues to partners not following our online policies.”- SVP, Global Hotel Company

“Shoplifters are using the Internet to exchanges information about how to defraud our retail operations.” -Director, Loss Prevention of Large Brand Retailer

“Criminals are using our Web 2.0-enabled online community to target our customers with malware and

predatory behavior.”- Director, Corporate Security of Large Consumer Goods Company

Page 4: Open Source Intelligence Overview

4© 2009 Cyveillance, Inc. www.cyveillance.com

The New Imperative for Security

In today’s Internet-enabled world, we must deliver security for a

borderless perimeter.

Endpoint Protection

Firewalls / Anti-SpamServer and System

Security

Partners and Consumers

Commerce

Reputation and Trust

Old Security“Protect the Enterprise”

New Security“Protect Your Business”

Page 5: Open Source Intelligence Overview

5© 2009 Cyveillance, Inc. www.cyveillance.com

Intelligence Defined

Intelligence is an instrument of conflict. It consists of words, numbers, images,

suggestions, appraisals, incitements. It consists also of truths that enlighten or

mislead, or of outright falsehoods. Because it is immaterial, intelligence cannot

wound. But its use has led to the killing or saving of millions.

-Angelo Codevilla

The ultimate objective of intelligence is to enable action to be optimized.

- Dr R. V. Jones

Chief, British Scientific

Intelligence World War II

Page 6: Open Source Intelligence Overview

6© 2009 Cyveillance, Inc. www.cyveillance.com

Cyveillance Intelligence Center

Cyveillance offers a full suite of online risk modules to

address enterprise-wide requirements.

Page 7: Open Source Intelligence Overview

7© 2009 Cyveillance, Inc. www.cyveillance.com

Protecting Your Business

Intellectual propertyIntellectual property Trade secretsTrade secrets Financial informationFinancial information M&A plansM&A plans

InformationInformation

Plants and facilitiesPlants and facilities NetworksNetworks Business assetsBusiness assets ResourcesResources

InfrastructureInfrastructure

eCommerceeCommerce Personal credentialsPersonal credentials Credit cardCredit card PasswordsPasswords

InteractionsInteractions

ExecutivesExecutives CustomersCustomers PartnersPartners ChildrenChildren

Individuals Individuals

Page 8: Open Source Intelligence Overview

8© 2009 Cyveillance, Inc. www.cyveillance.com

Innovation Leadership

1st brand protection solution

Industry 1st case management system

Industry 1st Anti-Phishing

1st solution for info leaks and corporate security intelligence

1st Cross enterprise cyber intelligence portal

1st Web site reputation service

1st online anti-counterfeit solution

1st coverage of spam content

1st service for compromised personal credentials

1st image-based fraud detection

1st malware intelligence service

1997 1998 2000 2001 2002 2003 2004 2005 2006

Cyveillance has a proud history of introducing industry-firsts

Page 9: Open Source Intelligence Overview

9© 2009 Cyveillance, Inc. www.cyveillance.com

Cyveillance Intelligence Center

ContinuousMonitoring

ContinuousMonitoring

24 x 7 Coverage of

visible and hidden Internet

Text, image and behavior based

Real TimeDetection

Real TimeDetection

Broadest set of risks

Customer-specific filtering

Language independent

Management and Analysis

Portal

Management and Analysis

Portal

Permissions and workflow

Cross-enterprise dashboard

Case management

Corrective Response

Corrective Response

Enforcement tools

Complementary services

Specialized expertise and partnerships

The first enterprise solution for online risk management

Page 10: Open Source Intelligence Overview

10© 2009 Cyveillance, Inc. www.cyveillance.com

What Customers Say

Functionality:“Cyveillance has already alerted us to coordinated plans by anti-nuclear activists involving one of our facilities. The service has also turned up IP that was being leaked to the Internet by former employees.”

"There's no way me and my folks, even given the time to scour the Internet, could have found some of this stuff."

Director of Enterprise Security, Fortune 100 Energy Firm

Value:“What distinguished Cyveillance from other providers is their proactive approach. When our organization was the target of recent phishing attacks, Cyveillance helped us quickly eliminate fraudulent sites. In addition…their ability to constantly monitor movement of compromised credit/debit cards and personal information is unique.”

President, Credit Union Association

Value:“Cyveillance identified compromised accounts faster than our other internal anti-fraud systems in 35% of all cases. Our average fraud savings per compromised account is $4,700.”

Manager, Fraud Prevention, High Profile Retailer

ROI:“Using Cyveillance solutions over the last year, IHG recaptured millions in revenues that would have otherwise been lost to third parties and competitors, overspent on advertising, or paid out in the form of inflated commissions to its resellers.”

EVP, eCommerce, Global Hotel Chain

Page 11: Open Source Intelligence Overview

11© 2009 Cyveillance, Inc. www.cyveillance.com

Contact

Brent Peacher

Senior Manager, Business Development

(703)312-1203

[email protected]