SlideShare a Scribd company logo
Security Services and Solutions Enabling Secure Business
Mission:  To provide state-of-the-art security solutions and services to customers employing in-depth research, comprehensive analysis and knowledge share.  Vision:  To produce innovative security products and provide superior consulting services for enabling secure computing and business.  Introduction
V-Empower is global solutions and services company established 2000 North America: Bowie, Maryland USA Seattle, Washington USA Los Angeles, California USA Maple, Ontario Canada Europe: London, United Kingdom Asia Pacific Beijing, China South East Asia Hyderabad, India  Company Profile
Company Profile V-Empower saw a  206 %  increase in revenue in 2006 Our security team consists of highly talented industry experts Providers of security services and solutions to the worlds largest software company
Services Infrastructure Security Penetration Testing Network Infrastructure  Configuration Review of Infrastructure Devices Design and Deploy Secure Infrastructure Solutions Application Security Black Box Assessments (Penetration Testing) White Box Assessments (Detailed Code Reviews) Threat Analysis and Modeling Security Research and Development Security Program Development Resource Integration  Integrating Security into Systems Development Lifecycle (SDLC) Security Policy and Standards Development Security Program Analysis Training Services Secure Application Development Application Source Code Auditing Threat Analysis and Modeling Application Security Awareness
Comprehensive Penetration Services Typical Penetration Tests consist of arbitrary approaches
Comprehensive Penetration Services Systematic Approach Comprehensive Services Environment Specific Threat Evaluation Assets Driven Assessment Vulnerability Analysis Comprehensive Reporting Recommendations and Validation
Comprehensive Penetration Services Assurance on effective controls
Systematic Approach
Design And Architecture Review Background Analysis (Business Functionality) Design Documentation (Architecture Diagram) Asset Identification (Data Flow Diagrams) Review Design and Architecture
Threat Analysis and Modeling Review Threat Models  Environment Decomposition Asset Identification (Data, Functionality, etc) Operating Procedures Identification (Use Cases) Threat Identification (Based on Assets and Operations)
Comprehensive Assessment
Comprehensive Assessment Identify Technologies Involved
Host Assessment Default Configs Protocols Access Control Default Configs Services  Patches
Application Layer Assessment AuthN Protocol Elevation of Privileges Logging XSS, XRSF, RI, SQL Injection, BO Resources Cryptography Information D AuthZ Bypass DOS, Deface
Network Layer Assessment Firewall, IDS, etc Perimeter Cntrls Fuzz Testing Standard Eval Network Security Best Practices.
Risk Analysis and Reporting Risk Analysis Evaluation of each vulnerability to assess true risk to an environment. Risk is reported based on a matrix which evaluates the following keys factors Vulnerability classification (STRIDE - CIA) Classification of Asset Probability of Exploit Impact of Exploit
Risk Analysis and Reporting All vulnerabilities are given the following Severity Ratings:
Severity Ratings Critical :  Impact of vulnerability can compromise multiple applications/across organization boundaries. Recommend immediate mitigation. High :  Impact of vulnerability can compromise application with limited cross organization impact. Recommend priority in mitigation. Medium :  Best Practice & should be fixed with in next version release. Low :  Recommended best practice with low priority for mitigation.
Risk Analysis and Reporting Title Severity Explanation of Issue Explanation of Impact Real life attack scenario Proof of concept exploit Recommendations for Remediation Validation Steps References
Analysis and Reporting Critical High Medium Low
Acknowledgements What controls are effective which were tested. Break down of the controls which effectively guard the environment against different threat types.
Incremental Reviews Due to the in-dept Analysis performed at the first iteration of the assessment, any update and changes can be reviewed incrementally following the same approach.
Future Follow-up Establish future touch points or additional services required in relation to an assessment.
Our Team V-Empower Security Team (VST) consist of 27 consultants world wide providing services to Fortune 100 companies VST’s methodology and services have been incorporated by many clients VST’s has been featured in Microsoft’s Information Security Newsletter
Publications Advances in Forensics Intro to Exploits Coding Forensics with Open Source Software Pen Testing Tools Development Pen Testing Methodologies Exploits Coding Techniques Real Life VulnDev Process of a Win32 Stack Buffer Overflow Vulnerability Development on Linux and Win32 Elevation of Privileges in Thick Clients Presentations Antivirus (In)Security (Black Hat Europe 2007) Vulnerability Development under Unix and Win32 (CIH2K5, International Hackers Congress 2005) Introduction to Exploits Coding (InfoSecurity 2004) Automated Pen testing Tools Development (GCon III) Project Portfolio
Clients
Testimonials V-Empower Inc is the preferred Security Vendor for Microsoft. Testimonials … your team is the best in the business. - Todd Kutzke   ( Director , Microsoft) Another nice example of how good a job V-Empower is doing….extend my compliments to your team for the quality of their support and making sure our customers see the value of the services we provide… - Shawn Veney   ( Manager , ACE Team, Microsoft) Thank you! It’s outstanding that we had someone who actually knows about Email.    -  Yaron Goland  ( PRINCIPAL PROGRAM MANAGER , MSN) “ Quoted in relation to a vulnerability.”
Future Value Add to Wamu Methodology Knowledge Share Resource Augmentation Off shore development Code Reviews General Security Consulting

More Related Content

PDF
Presentation on vulnerability analysis
PPTX
Threat Modeling And Analysis
PPTX
Software security testing
PPTX
Cyber Threat Modeling
PPTX
Threat Simulation and Modeling Training
PPTX
Classification of vulnerabilities
PDF
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
PDF
Threat Modeling workshop by Robert Hurlbut
Presentation on vulnerability analysis
Threat Modeling And Analysis
Software security testing
Cyber Threat Modeling
Threat Simulation and Modeling Training
Classification of vulnerabilities
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Threat Modeling workshop by Robert Hurlbut

What's hot (20)

PPT
Application Threat Modeling
PDF
[Warsaw 26.06.2018] SDL Threat Modeling principles
PPTX
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
PPTX
Intro to Security in SDLC
PPTX
Security Training: #3 Threat Modelling - Practices and Tools
PPT
Software Security Initiatives
PDF
Threat Modeling: Best Practices
PDF
Security Testing
PPT
STRIDE And DREAD
PDF
Developing a Threat Modeling Mindset
PPTX
Integrating Security Across SDLC Phases
PPTX
7 Steps to Threat Modeling
PPTX
IT6701-Information Management Unit 2
PDF
Arved sandstrom - the rotwithin - atlseccon2011
PDF
20160831_app_storesecurity_Seminar
PPTX
Sdl deployment in ics
PPTX
MSRC - Funcionamiento
PPT
Business cases for software security
PPTX
Threat modeling
Application Threat Modeling
[Warsaw 26.06.2018] SDL Threat Modeling principles
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
Intro to Security in SDLC
Security Training: #3 Threat Modelling - Practices and Tools
Software Security Initiatives
Threat Modeling: Best Practices
Security Testing
STRIDE And DREAD
Developing a Threat Modeling Mindset
Integrating Security Across SDLC Phases
7 Steps to Threat Modeling
IT6701-Information Management Unit 2
Arved sandstrom - the rotwithin - atlseccon2011
20160831_app_storesecurity_Seminar
Sdl deployment in ics
MSRC - Funcionamiento
Business cases for software security
Threat modeling
Ad

Viewers also liked (17)

PPT
Mappeoppgave 3 Presentasjon
PDF
V-Empower Corporate Brochure
PPT
Spain Us Chamber Sc Presentation 12 1
PPT
V Empower Inc.
PPT
Energies Renovables 1 1
PPT
Sigmar Overview 2008
PDF
Big picture
PDF
V-Empower, Inc. Corporate Presentation 2013.
PDF
MicroMedia yritysesite
PPTX
Facebook users in top 20 cities
PPT
Eksamen 08
PDF
Bh Sample Work
PPT
Mappeoppgave 3 Presentasjon
PDF
White Tiger or Brown Parrot?
PDF
V-Empower Technical Competence Workflow
PPT
7 Sm Gaps Model
PPT
Intelligent Fields: A New Era for Oil and Gas Field Development
Mappeoppgave 3 Presentasjon
V-Empower Corporate Brochure
Spain Us Chamber Sc Presentation 12 1
V Empower Inc.
Energies Renovables 1 1
Sigmar Overview 2008
Big picture
V-Empower, Inc. Corporate Presentation 2013.
MicroMedia yritysesite
Facebook users in top 20 cities
Eksamen 08
Bh Sample Work
Mappeoppgave 3 Presentasjon
White Tiger or Brown Parrot?
V-Empower Technical Competence Workflow
7 Sm Gaps Model
Intelligent Fields: A New Era for Oil and Gas Field Development
Ad

Similar to V-Empower Services And Solutions (20)

PPT
Core.co.enterprise.deck.06.16.10
PDF
Penetration Testing Services - Redfox Cyber Security
PPT
Security Considerations in Process Control and SCADA Environments
PPTX
Security assessment isaca sv presentation jan 2016
PDF
Penetration Testing Services in Melbourne, Sydney & Brisbane.pdf
PPT
Software Security Engineering
PPT
Software Security in the Real World
PDF
Website Security Service.pdf
PDF
Why Penetration Tests Are Important Cyber51
PDF
Experience Sharing on School Pentest Project
PDF
Defense In Depth Using NIST 800-30
PPT
AMI Security 101 - Smart Grid Security East 2011
PDF
NessPRO Italy on CAST
PPTX
Security assessment with a hint of CISSP Prep
PPTX
Дмитро Терещенко, "How to secure your application with Secure SDLC"
PDF
Security is our duty and we shall deliver it - White Paper
PDF
RAMNSS_2016_service_porfolio
PPT
IBM Rational AppScan Product Overview
PPTX
Aksit profile final
PPTX
AKS IT Corporate Presentation
Core.co.enterprise.deck.06.16.10
Penetration Testing Services - Redfox Cyber Security
Security Considerations in Process Control and SCADA Environments
Security assessment isaca sv presentation jan 2016
Penetration Testing Services in Melbourne, Sydney & Brisbane.pdf
Software Security Engineering
Software Security in the Real World
Website Security Service.pdf
Why Penetration Tests Are Important Cyber51
Experience Sharing on School Pentest Project
Defense In Depth Using NIST 800-30
AMI Security 101 - Smart Grid Security East 2011
NessPRO Italy on CAST
Security assessment with a hint of CISSP Prep
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Security is our duty and we shall deliver it - White Paper
RAMNSS_2016_service_porfolio
IBM Rational AppScan Product Overview
Aksit profile final
AKS IT Corporate Presentation

V-Empower Services And Solutions

  • 1. Security Services and Solutions Enabling Secure Business
  • 2. Mission: To provide state-of-the-art security solutions and services to customers employing in-depth research, comprehensive analysis and knowledge share. Vision: To produce innovative security products and provide superior consulting services for enabling secure computing and business. Introduction
  • 3. V-Empower is global solutions and services company established 2000 North America: Bowie, Maryland USA Seattle, Washington USA Los Angeles, California USA Maple, Ontario Canada Europe: London, United Kingdom Asia Pacific Beijing, China South East Asia Hyderabad, India Company Profile
  • 4. Company Profile V-Empower saw a 206 % increase in revenue in 2006 Our security team consists of highly talented industry experts Providers of security services and solutions to the worlds largest software company
  • 5. Services Infrastructure Security Penetration Testing Network Infrastructure Configuration Review of Infrastructure Devices Design and Deploy Secure Infrastructure Solutions Application Security Black Box Assessments (Penetration Testing) White Box Assessments (Detailed Code Reviews) Threat Analysis and Modeling Security Research and Development Security Program Development Resource Integration Integrating Security into Systems Development Lifecycle (SDLC) Security Policy and Standards Development Security Program Analysis Training Services Secure Application Development Application Source Code Auditing Threat Analysis and Modeling Application Security Awareness
  • 6. Comprehensive Penetration Services Typical Penetration Tests consist of arbitrary approaches
  • 7. Comprehensive Penetration Services Systematic Approach Comprehensive Services Environment Specific Threat Evaluation Assets Driven Assessment Vulnerability Analysis Comprehensive Reporting Recommendations and Validation
  • 8. Comprehensive Penetration Services Assurance on effective controls
  • 10. Design And Architecture Review Background Analysis (Business Functionality) Design Documentation (Architecture Diagram) Asset Identification (Data Flow Diagrams) Review Design and Architecture
  • 11. Threat Analysis and Modeling Review Threat Models Environment Decomposition Asset Identification (Data, Functionality, etc) Operating Procedures Identification (Use Cases) Threat Identification (Based on Assets and Operations)
  • 13. Comprehensive Assessment Identify Technologies Involved
  • 14. Host Assessment Default Configs Protocols Access Control Default Configs Services Patches
  • 15. Application Layer Assessment AuthN Protocol Elevation of Privileges Logging XSS, XRSF, RI, SQL Injection, BO Resources Cryptography Information D AuthZ Bypass DOS, Deface
  • 16. Network Layer Assessment Firewall, IDS, etc Perimeter Cntrls Fuzz Testing Standard Eval Network Security Best Practices.
  • 17. Risk Analysis and Reporting Risk Analysis Evaluation of each vulnerability to assess true risk to an environment. Risk is reported based on a matrix which evaluates the following keys factors Vulnerability classification (STRIDE - CIA) Classification of Asset Probability of Exploit Impact of Exploit
  • 18. Risk Analysis and Reporting All vulnerabilities are given the following Severity Ratings:
  • 19. Severity Ratings Critical : Impact of vulnerability can compromise multiple applications/across organization boundaries. Recommend immediate mitigation. High : Impact of vulnerability can compromise application with limited cross organization impact. Recommend priority in mitigation. Medium : Best Practice & should be fixed with in next version release. Low : Recommended best practice with low priority for mitigation.
  • 20. Risk Analysis and Reporting Title Severity Explanation of Issue Explanation of Impact Real life attack scenario Proof of concept exploit Recommendations for Remediation Validation Steps References
  • 21. Analysis and Reporting Critical High Medium Low
  • 22. Acknowledgements What controls are effective which were tested. Break down of the controls which effectively guard the environment against different threat types.
  • 23. Incremental Reviews Due to the in-dept Analysis performed at the first iteration of the assessment, any update and changes can be reviewed incrementally following the same approach.
  • 24. Future Follow-up Establish future touch points or additional services required in relation to an assessment.
  • 25. Our Team V-Empower Security Team (VST) consist of 27 consultants world wide providing services to Fortune 100 companies VST’s methodology and services have been incorporated by many clients VST’s has been featured in Microsoft’s Information Security Newsletter
  • 26. Publications Advances in Forensics Intro to Exploits Coding Forensics with Open Source Software Pen Testing Tools Development Pen Testing Methodologies Exploits Coding Techniques Real Life VulnDev Process of a Win32 Stack Buffer Overflow Vulnerability Development on Linux and Win32 Elevation of Privileges in Thick Clients Presentations Antivirus (In)Security (Black Hat Europe 2007) Vulnerability Development under Unix and Win32 (CIH2K5, International Hackers Congress 2005) Introduction to Exploits Coding (InfoSecurity 2004) Automated Pen testing Tools Development (GCon III) Project Portfolio
  • 28. Testimonials V-Empower Inc is the preferred Security Vendor for Microsoft. Testimonials … your team is the best in the business. - Todd Kutzke ( Director , Microsoft) Another nice example of how good a job V-Empower is doing….extend my compliments to your team for the quality of their support and making sure our customers see the value of the services we provide… - Shawn Veney ( Manager , ACE Team, Microsoft) Thank you! It’s outstanding that we had someone who actually knows about Email.   - Yaron Goland ( PRINCIPAL PROGRAM MANAGER , MSN) “ Quoted in relation to a vulnerability.”
  • 29. Future Value Add to Wamu Methodology Knowledge Share Resource Augmentation Off shore development Code Reviews General Security Consulting