The Silicon Review - Best Business Review Magazine 10 Best Security Companies 2019 | Page 22

C O V E R STORY isolation of problems, minimizing false positives, mitigation and remediation processes of cyber incidences 365 days a year. It also helps its client utilize their existing security systems to their maximum. CYREBRO One “CYREBRO One” is a ‘turn-key’ solution for organizations that have no SIEM or data collection technologies in place. “CYREBRO One” provides SIEM licensing and set-up, SOC services, 24/7 monitoring coverage; the end to end T1 –T4 capabilities, advanced forensics and response capabilities. The solution combines technology, expert skills, processes and procedures and a managed end-to- end solution. Unique Features of CYREBRO • • • • • • • • • • • • 22 100% technology agnostic Advanced forensic capabilities In-house cyber threat intelligence Fast and cost-effective “Setup time” Offensive oriented design and operation Extensive offensive and investigative experience Ongoing, customized, client- facing reports and updates Provides Tier1 to 4 multi-layer monitoring and response Professional incidents response, 24/7 expert response team A unique, monitoring optimization process, designed for “Quality alerting” Hands-on management and experience with all the world’s top SIEM technologies Highly qualified and experienced analyst team, as APRIL 2019 veterans of the Israeli Military and various security agencies on both the state and corporate level Professional Services: Cyber Security Readiness Assessment CyberHat’s unique cybersecurity readiness assessment is based on years of practical offensive expertise. It designed and built a unique, on-site, professional assessment that provides clear and tangible insights into an organization’s cyber defence capability. The company evaluates a client’s security readiness and provides a roadmap of remedial actions which address three core elements: • Resilience • Response • Recovery abilities The Firm’s Methodology CyberHat’s methodology is focused on the gap between theory and fact. The assessment creates a clear and coherent picture of the true cybersecurity posture of the organization and its ability to handle real-life cyber incidents. Attack scenario analysis – CyberHat’s methodology includes a comprehensive analysis that is carried out by tracing known attack phases and examining how a potential attacker could exploit the organization’s existing gaps throughout the different attack vectors. Targeted Hacking Simulations The Challenge Almost all organizations base their core business on technology assets, comprised of personal devices and critical operational servers with sensitive business information connected to the network – and therefore are exposed to cyber threats and cyber-attacks. The Solution Targeted Hacking Simulations – CyberHat’s hackers & crackers team simulates high level sophisticated hacking simulation that focuses on information assets rather than information systems. The attack simulates a motivated group of hackers that target the organizational assets: source code, emails, financial information, general production environment and any other organizational level assets. The hacking simulation provides the organization with a unique experience of walking through a real-life cyber-attack in a contained and safe environment. Scope of Work The Simulation consists of a 2 step process, designed to test both the external defensive capabilities and the internal defences. The Tests may include any or all of the following: External • • • • • • All aspect of social engineering Malware manipulations Advanced Phishing (Internet or Cellular) Circumventing protection systems Examining of remote access capabilities (VPN, Terminal, etc) External facing applications Internal • • • • The resilience of networks separation Internal employee rouge simulation Identification and alerts testing Manual and in-depth testing for logical problems in the infrastructure architecture and settings SR