The Silicon Review - Best Business Review Magazine 10 Best Security Companies 2019 | Page 22
C
O
V
E
R
STORY
isolation of problems, minimizing
false positives, mitigation and
remediation processes of cyber
incidences 365 days a year. It also
helps its client utilize their existing
security systems to their maximum.
CYREBRO One
“CYREBRO One” is a ‘turn-key’
solution for organizations that
have no SIEM or data collection
technologies in place. “CYREBRO
One” provides SIEM licensing
and set-up, SOC services, 24/7
monitoring coverage; the end to
end T1 –T4 capabilities, advanced
forensics and response capabilities.
The solution combines technology,
expert skills, processes and
procedures and a managed end-to-
end solution.
Unique Features of CYREBRO
•
•
•
•
•
•
•
•
•
•
•
•
22
100% technology agnostic
Advanced forensic capabilities
In-house cyber threat
intelligence
Fast and cost-effective “Setup
time”
Offensive oriented design and
operation
Extensive offensive and
investigative experience
Ongoing, customized, client-
facing reports and updates
Provides Tier1 to 4 multi-layer
monitoring and response
Professional incidents response,
24/7 expert response team
A unique, monitoring
optimization process, designed
for “Quality alerting”
Hands-on management and
experience with all the world’s
top SIEM technologies
Highly qualified and
experienced analyst team, as
APRIL 2019
veterans of the Israeli Military
and various security agencies
on both the state and corporate
level
Professional Services:
Cyber Security Readiness
Assessment
CyberHat’s unique cybersecurity
readiness assessment is based
on years of practical offensive
expertise. It designed and built
a unique, on-site, professional
assessment that provides clear
and tangible insights into an
organization’s cyber defence
capability. The company evaluates
a client’s security readiness and
provides a roadmap of remedial
actions which address three core
elements:
• Resilience
• Response
• Recovery abilities
The Firm’s Methodology
CyberHat’s methodology is
focused on the gap between
theory and fact. The assessment
creates a clear and coherent
picture of the true cybersecurity
posture of the organization and
its ability to handle real-life cyber
incidents. Attack scenario analysis
– CyberHat’s methodology includes
a comprehensive analysis that
is carried out by tracing known
attack phases and examining how
a potential attacker could exploit
the organization’s existing gaps
throughout the different attack
vectors.
Targeted Hacking
Simulations
The Challenge
Almost all organizations base their
core business on technology assets,
comprised of personal devices and
critical operational servers with
sensitive business information
connected to the network – and
therefore are exposed to cyber
threats and cyber-attacks.
The Solution
Targeted Hacking Simulations –
CyberHat’s hackers & crackers team
simulates high level sophisticated
hacking simulation that focuses
on information assets rather
than information systems. The
attack simulates a motivated
group of hackers that target the
organizational assets: source code,
emails, financial information,
general production environment
and any other organizational level
assets. The hacking simulation
provides the organization with
a unique experience of walking
through a real-life cyber-attack in a
contained and safe environment.
Scope of Work
The Simulation consists of a 2 step
process, designed to test both the
external defensive capabilities and
the internal defences. The Tests may
include any or all of the following:
External
•
•
•
•
•
•
All aspect of social engineering
Malware manipulations
Advanced Phishing (Internet or
Cellular)
Circumventing protection
systems
Examining of remote access
capabilities (VPN, Terminal, etc)
External facing applications
Internal
•
•
•
•
The resilience of networks
separation
Internal employee rouge
simulation
Identification and alerts testing
Manual and in-depth testing
for logical problems in the
infrastructure architecture and
settings
SR